top of page
Secure Hybrid Identity™
Data and Risk Management
Search


Azure Privileged Identity Management. Here’s why you need it.
Privileged Identity Management (PIM) is an Azure AD security component designed on the principles of just-in-time access for managing, monit

James Buchan
Aug 2, 20223 min read
Â
Â
Â


Azure AD Group Writeback
Microsoft has released a big update to its Azure AD group writeback feature. The most significant change is that security groups can now be

Chris Swales
Jul 25, 20225 min read
Â
Â
Â


Identity Management and the Cloud: Not a simple transition
The cloud dominates today's technology conversations. It is the new paradigm for flexibility, scale and cost management. As these...

Performanta
Jun 7, 20223 min read
Â
Â
Â


Where is cyber on your board agenda?
Is cyber security being given the prominence and funding it deserves in the boardroom? Despite an ever-growing list of headline-stealing,...

Lior Arbel
Jan 11, 20224 min read
Â
Â
Â


Top cybersecurity stats to guide you in 2022
A compilation of the recent top cyber security statistics, facts and figures from across the industry, to help you keep abreast of the...

Performanta
Jan 7, 20221 min read
Â
Â
Â


Cybercrime's evolution and how we can fight back
How bad can a cyberattack be? This question often comes up in conversations with companies still contemplating their strategy against...

Stephen Kreusch
Dec 8, 20213 min read
Â
Â
Â


10 tips for staying digitally secure during the holidays
Cybercrime doesn't take a holiday. While many of us look forward to some time off, the combination of relaxation and increased spending...

Brendan Kotze
Dec 3, 20214 min read
Â
Â
Â


Security hygiene for the 2020s
Be more alert. Cybercrime has evolved to become an even greater threat than ever before, as it is not hard to steal someone's login...

Elad Sherf
Nov 29, 20214 min read
Â
Â
Â


Zero trust – what should a best practice strategy look like?
It can seem as though zero trust is today’s security buzzword – overused to the point of cliché. Certainly, a lot has changed since 1994...

Lior Arbel
Nov 22, 20213 min read
Â
Â
Â


Re-Inventing IT Security
Machiavelli wrote 500 years ago in The Prince, “there is no more delicate matter to take in hand, nor more dangerous to conduct, nor more...

Brendan Kotze
Aug 27, 20212 min read
Â
Â
Â


How to be incredibly unsuccessful at everything cyber security - as a Manager and in your career.
Part three As a manager Do not invest in your people, they could challenge you, or worse replace you. Keep having meetings, and wonder...

Brendan Kotze
Aug 20, 20213 min read
Â
Â
Â


How to be incredibly unsuccessful at everything cyber security as a Vendor
Part two The views and items listed may offend or be taken in the wrong light. To those people we apologize. To the rest, we hope it...

Brendan Kotze
Aug 13, 20213 min read
Â
Â
Â


Security solutions alone are not enough
Keeping your business out of the hands of cyber-attackers is not what most company leaders signed up for. And when you have to juggle...

Lior Arbel
Aug 10, 20214 min read
Â
Â
Â


How to be incredibly unsuccessful at everything cyber security as a CISO
Part one Far too often, things go unsaid in our industry, so we attempted to take a satirical look at how to ensure you're incredibly...

Brendan Kotze
Jul 29, 20212 min read
Â
Â
Â


Remedying cyber affordability
To many small businesses, IT and IT security provision is often deemed a non-important business driver. In-house security expertise is...

Brendan Kotze
Jul 21, 20214 min read
Â
Â
Â


The real price of cyber vulnerability
Exposure to hacking risk isn’t just a threat to reputation: increasingly, it’s undermining business valuations. But if compliance and...

Performanta
Jul 21, 20214 min read
Â
Â
Â
bottom of page