As the cloud threat landscape evolves, so too must the methodologies we use to defend against it. By bridging the gap between threat frameworks (MITRE ATT&CK) and control frameworks (CSA CCM), this ...
Cloudticity completes SOC 2 Type II Examination, reinforcing commitment to protecting sensitive healthcare data & ...
Explores how continuous monitoring and structured check-ins close the coordination gap in cloud security, boosting ...
Why I Stopped JIT’ing Users and Started JIT’ing Permissions By Cole HorsmanField CTO, Sonrai Security I first tried to “shift left” cloud identity in early 2020. We were building a greenfield AWS ...
QNB maintains a secure and resilient operating environment, supported by robust systems designed to safeguard against cyber ...
Configuration and data sovereignty considerations for enhanced cloud securityIssued by Man TK IT SolutionsJohannesburg, 03 Feb 2026 Muzi Langa, MD of ManTK IT Solution. (Image: Supplied) A key ...
How Can Least Privilege Transform Secure Cloud Operations? Have you ever pondered the repercussions of over-privileged access in cloud environments? With the rapid adoption of cloud technologies, the ...
Hybrid everywhere, AI guarding security, data treated like a product, automation doing the heavy lifting and compute moving ...
A set of attack vectors in GitHub Codespaces have been uncovered that enable remote code execution (RCE) by opening a ...
With enterprise security, speed killsIf the enterprise will not slow down, security has to change. The question is how. By Tiana Cline, ContributorJohannesburg, 05 Feb 2026Russell Thipha, Intellehub ...
Accumulus Technologies, a leading cloud technology provider for regulatory exchange, today announced the achievement of three major third-party security ...
Zylpha, a provider of Court bundling software has achieved recertification to ISO 27001:2022, the latest iteration of ...