Pretty Good Privacy (PGP)

Understanding Pretty Good Privacy (PGP) and Its Importance in the Digital Age In our increasingly digital world, the security and privacy of communication have become paramount. With the constant threat of cyberattacks, surveillance, and data breaches, individuals and organizations are looking for reliable ways to protect their sensitive information. One of the most well-regarded toolsContinue reading “Pretty Good Privacy (PGP)”

SSL vs TLS: An Information Security Perspective

It is no longer something extra — in the present digital world, security of data is needed more than ever. Many organizations and individuals focus on the security of their online communications, and often the subjects of SSL (Secure Sockets Layer) and TLS (Transport Layer Security) arise. Although SSL and TLS can be mentioned inContinue reading “SSL vs TLS: An Information Security Perspective”

July 2025: Major Data Breaches and Cyber Attacks

Axis Max Life Insurance Announces Data Breach Axis Max Life Insurance, has reported being notified by an anonymous source about their unauthorized access to some customer information in a data breach.  The incident has prompted a comprehensive security assessment and rigorous data log analysis. The company released a statement confirming the initiation of a detailedContinue reading “July 2025: Major Data Breaches and Cyber Attacks”

June 2025: Major Data Breaches and Cyber Attacks

ICC detects and contains new sophisticated cyber security incident Late last week, the International Criminal Court (“ICC” or “the Court”) detected a new, sophisticated and targeted cyber security incident, which has now been contained.  This incident, the second of this type against the ICC in recent years, was swiftly discovered, confirmed and contained, through the Court’s alertContinue reading “June 2025: Major Data Breaches and Cyber Attacks”

Proxy vs VPN

What is Proxy? An internet proxy (or proxy server) is an intermediary system that sits between your device and the internet. When you use a proxy, your internet requests (like visiting a website) are first sent to the proxy server. The proxy then forwards these requests to the destination website or online service on yourContinue reading “Proxy vs VPN”

May 2025: Major Data Breaches and Cyber Attacks

South African Airways hit by cyber attack South African Airways (SAA) has become the latest organisation to fall victim to a cyber attack. In a statement released today, the flagship carrier of South Africa says it has been impacted by a significant cyber incident that began on Saturday, 3 May. According to SAA, the breachContinue reading “May 2025: Major Data Breaches and Cyber Attacks”

April 2025: Major Data Breaches and Cyber Attacks

Ransomware surge: Sensata Technologies, US state agencies targeted in widespread cyber incidents Industrial technology company Sensata Technologies disclosed that the company experienced a ransomware attack that encrypted parts of its network. The company took its systems offline, initiated response protocols, and launched an investigation with third-party cybersecurity experts. Law enforcement has been notified and is involved. ThisContinue reading “April 2025: Major Data Breaches and Cyber Attacks”

Transitioning to PCI DSS 4.0: Essential Compliance Updates

The shift from PCI DSS 3.2.1 to 4.0 brings critical security enhancements to protect payment card data against evolving cyber threats. If your organization processes payments, these changes will impact you. The below table highlights changes for each requirement: Requirement PCI DSS v3.2.1 PCI DSS v4.0 (Changes & Enhancements) 1: Install and maintain a firewallContinue reading “Transitioning to PCI DSS 4.0: Essential Compliance Updates”

March 2025: Major Data Breaches and Cyber Attacks

Data breach at Japanese telecom giant NTT hits 18,000 companies Japanese telecommunication services provider NTT Communications Corporation (NTT) is warning almost 18,000 corporate customers that their information was compromised during a cybersecurity incident. The data breach was discovered in early February 2025, but the exact date when the hackers gained initial access to NTT’s systemsContinue reading “March 2025: Major Data Breaches and Cyber Attacks”

Implementing ISO 27001: A Step-by-Step Guide

Steps to implement ISO 27001 Context Setting What activities you should follow: These activities should deliver the following: The below templates can be used for documentation purposes: Risk Assessment Threats, Vulnerabilities & Risks Threat: A potential cause of an unwanted Incident, which may result in harm to a System or Organization Vulnerability: A vulnerability isContinue reading “Implementing ISO 27001: A Step-by-Step Guide”