Our Knowledge Hub
A collection of observations, guidance, information and opinion, on all things cyber, and information security, as well as company updates.
Essential security scans and remediation for organisations
Essential security scans and remediation advice for organisations Learn how to protect your organisation ...
Cognisys expands its global reach to the USA
Cognisys expands its global reach to the USA Our launch marks an exciting milestone ...
Why hire a vCISO for your compliance needs?
Why hire a vCISO for your compliance needs? Learn how a Virtual Chief Information ...
ISO 42001: The new AI management system standard
ISO 42001: The new AI management system standard Learn how the ISO 42001 certification ...
Top 10 best practices for API security
Top 10 best practices for API security Learn why API security is more important ...
How has ransomware evolved over the years?
How has ransomware evolved over the years? Learn about ransomware's evolution from basic attacks ...
The biggest cyber attacks and vulnerabilities from October 2024
The biggest cyber attacks and vulnerabilities from October 2024 Insights and trends from recent ...
Cyber security awareness and best practices
Cyber security awareness and best practices Learn the importance of employee engagement in cyber ...
How penetration testing helps achieve compliance
How penetration testing helps achieve compliance Learn how penetration testing can help with achieving ...
What is vulnerability management?
What is vulnerability management? In this blog, we discuss what vulnerability management is, the ...
The biggest cyber attacks and vulnerabilities from September 2024
The biggest cyber attacks and vulnerabilities from September 2024 Insights and trends from recent ...
The growing importance of Zero Trust security
The growing importance of Zero Trust security In this blog, we discuss the ...
Why cloud pentesting is essential for business security in 2024
Why cloud pen testing is essential for business security in 2024 In this ...
The biggest cyber attacks and vulnerabilities from August 2024
The biggest cyber attacks and vulnerabilities from August 2024 Insights and trends from recent ...
Black box vs. grey box vs. white box penetration testing
Black box vs. grey box vs. white box penetration testing In this blog, ...
Exploring the psychological underpinnings of social engineering attacks
Exploring the psychological underpinnings of social engineering attacks In this blog, we discuss ...
Cyber Essentials vs. Cyber Essentials Plus: which certification is right for your business?
Cyber Essentials vs. Cyber Essentials Plus: which certification is right for your business? In ...
The biggest cyber attacks and vulnerabilities from July 2024
The biggest cyber attacks and vulnerabilities from July 2024 Insights and trends from recent ...
Global Windows Outage: CrowdStrike update causing BSOD for computers running Microsoft Windows
CrowdStrike update causing BSOD for computers running Microsoft Windows In this blog, we will ...
File upload vulnerabilities
Unmasking file upload vulnerabilities: protecting your system In this blog, we will unravel the ...
New critical SSH vulnerability released
New critical SSH vulnerability released In this blog, we cover the new SSH vulnerability ...
The biggest cyber attacks and vulnerabilities from June 2024
The biggest cyber attacks and vulnerabilities from June 2024 Insights and trends from recent ...
Supply chain attacks
Supply chain attacks awareness tips Hear from our tech team on how to enhance ...
Key features your vulnerability management platform must have
Key features your vulnerability management platform must have In this blog, we delve into ...
Understanding internal vs. external penetration testing: which is best for your business?
Understanding internal vs. external penetration testing: which is best for your business? In this ...