Network Terminology

Virtual Local Area Network (VLAN) A VLAN, or Virtual Local Area Network, is a logical segmentation of a physical network allowing multiple groups of devices to be separated into distinct broadcast domains even if they share the same physical infrastructure. In simple words, imagine you have a big school with lots of classrooms and manyContinue reading “Network Terminology”

The Role of NTP Servers in Information Security: Why Accurate Time Matters

In the world of cybersecurity, we often focus on firewalls, intrusion detection systems, encryption algorithms, and endpoint defenses. Yet, one of the most fundamental elements of a secure and reliable IT infrastructure is often overlooked: time synchronization. This is where the Network Time Protocol (NTP) server comes into play. NTP is more than just aContinue reading “The Role of NTP Servers in Information Security: Why Accurate Time Matters”

Pretty Good Privacy (PGP)

Understanding Pretty Good Privacy (PGP) and Its Importance in the Digital Age In our increasingly digital world, the security and privacy of communication have become paramount. With the constant threat of cyberattacks, surveillance, and data breaches, individuals and organizations are looking for reliable ways to protect their sensitive information. One of the most well-regarded toolsContinue reading “Pretty Good Privacy (PGP)”

SSL vs TLS: An Information Security Perspective

It is no longer something extra — in the present digital world, security of data is needed more than ever. Many organizations and individuals focus on the security of their online communications, and often the subjects of SSL (Secure Sockets Layer) and TLS (Transport Layer Security) arise. Although SSL and TLS can be mentioned inContinue reading “SSL vs TLS: An Information Security Perspective”

June 2025: Major Data Breaches and Cyber Attacks

ICC detects and contains new sophisticated cyber security incident Late last week, the International Criminal Court (“ICC” or “the Court”) detected a new, sophisticated and targeted cyber security incident, which has now been contained.  This incident, the second of this type against the ICC in recent years, was swiftly discovered, confirmed and contained, through the Court’s alertContinue reading “June 2025: Major Data Breaches and Cyber Attacks”

Proxy vs VPN

What is Proxy? An internet proxy (or proxy server) is an intermediary system that sits between your device and the internet. When you use a proxy, your internet requests (like visiting a website) are first sent to the proxy server. The proxy then forwards these requests to the destination website or online service on yourContinue reading “Proxy vs VPN”

May 2025: Major Data Breaches and Cyber Attacks

South African Airways hit by cyber attack South African Airways (SAA) has become the latest organisation to fall victim to a cyber attack. In a statement released today, the flagship carrier of South Africa says it has been impacted by a significant cyber incident that began on Saturday, 3 May. According to SAA, the breachContinue reading “May 2025: Major Data Breaches and Cyber Attacks”

AWS Security – Part 1- Securing Root Account with MFA

Task: Create AWS account and set up for below tasks What is the need to perform this: Securing an AWS root account is crucial because it has unrestricted access to all resources and services within your AWS environment. If compromised, an attacker could delete resources, steal data, or even lock you out of your ownContinue reading “AWS Security – Part 1- Securing Root Account with MFA”

Audit Conclusions

Objectives of Audit Conclusions Preparing Audit Conclusions ISO 19011, clause 6.4.9 Before the closing meeting, the auditors meeting consult each other to: Discussing Audit Conclusions with the Auditee It is important to discuss audit findings and conclusions with the management before the closing meeting and submitting the final report to: Closing Meeting Agenda Model PreparingContinue reading “Audit Conclusions”