Beware the humble QR Code: Protecting Your...
Learn how to protect your business from quishing attacks by understanding the risks of malicious QR codes and implementing effective security...
Learn how to protect your business from quishing attacks by understanding the risks of malicious QR codes and implementing effective security...
The importance of aligning technology changes and innovations with your business's core purpose as a driver of long-term business success.
Learn more about the six most common types of penetration testing in cyber security to identify security vulnerabilities and protect your...
Exploring the key differences between public, private, multi and hybrid clouds and providing real-world use cases to help you understand the best...
Explore essential defensive cyber security strategies to protect your business from data breaches, malware, and phishing attacks.
This article explores the complexities of data maturity for business leaders, executives, and decision-makers, providing actionable insights to take...
From training to network segmentation, learn the importance of proactive measures and strategic approaches to protect your vessel and crew from...
Unpacking the role of business leaders in shaping effective business intelligence (BI) strategies to enable informed decisions, ensuring maximum...
Read how LAW FOR ALL's partnership with Cyberlogic's CyberForensics team resulted in an incident response plan that improved cyber security and GRC...
Learn how GreatSoft successfully scaled its SaaS business by leveraging Cyberlogic's CyberCloud solution to host its clients' data.
Discover the differences between these three penetration testing approaches to improve your organisation's cyber security.
How Fruitways created a stable data platform and enabled a single version of truth across its operations with Cyberlogic DataGeek.
From planning to reporting, let's explore the six stages of the penetration testing process.
Let's explore the power of automated vs. manual penetration testing in cyber security.
Cyberlogic CEO, Mark Tew, will be taking part in the ultimate test of endurance and skill for mountain bike enthusiasts to raise funds for Education.
Kanu Equipment uncovered millions in un-invoiced revenue and used data-driven stock management to double revenue without increasing its stock holding.
Let's delve into the world of penetration testing, exploring its definition, purpose, and the crucial role it plays beyond regulatory requirements.
Cyberlogic’s extensive global cyber security team attended the recent BSides Cape Town conference, which took place on December 2nd, 2023.
In the world of dynamic cyber threats, penetration testing is the first step in weaving a tapestry of cyber security strategies to form a robust...
Cyberlogic welcomes seasoned IT Advisory expert, Francois Kriel, as a senior member of the IT Advisory capability and Client Success Team.
How a leading food production company transformed its IT operations through centralisation of data and licensing with Cyberlogic.
Cyberlogic DataGeek secures Microsoft Solutions Partner status for Data and AI (Azure) under the innovative Microsoft Cloud Partner Program.
A data breach can cause unrecoverable damage to your business's reputation. Governance, Risk, and Compliance (GRC) is key in protecting your...
In the aftermath of a data breach, expenses rapidly accumulate. Governance, Risk, and Compliance (GRC) plays a key role in safeguarding your bottom...
Let's examine the role Governance, Risk, and Compliance (GRC) plays in creating a holistic cyber security landscape.
Governance, Risk, and Compliance (GRC) is critical for business success today, and not just for enterprises. But what is GRC and why does your SMB...
To prevent becoming a potential victim of cyber attackers, simply go through this 5-step checklist every time you receive an email.
No matter what size, service or sector, every company urgently needs to understand its cyber security posture and levels of vulnerability, because...
With most modern businesses depending on technology and digital connectivity to operate, a breach, threat or upset in this area could leave any...
Without best-practice cost management, the average organisation can overspend on its IT cloud budget by up to 40%. With businesses shifting many of...
Spiralling cyber-attacks including ransomware, hacking, phishing and countless other security risks make proactive, effective cyber security...