top of page
Search


You Should Know – Cyber Resilience Recap
Over the past few weeks, we’ve walked you through the 4 critical steps in the Cyber Resilience journey—each one designed to help your...
-
Aug 6, 20251 min read


You Should Know - Improve - Security Control Validation (Step 4)
You Should Know: Cyber Resilience doesn’t stop at setting up defences—it's about making sure they work, all the time. At Securicom , we...
-
Jul 30, 20251 min read


You Should Know - Respond - Resilience Planning (Step 3)
You Should Know: What happens after a breach—and how you can bounce back stronger. At Securicom we’re committed to helping you build...
-
Jul 23, 20252 min read


You Should Know - Step 2: Analyse – Threat and Likelihood Modelling
You Should Know: Exactly how exposed are you—and what does that exposure really mean? At Securicom we’re committed to helping you...
-
Jul 16, 20252 min read


You Should Know – Discovery – Understanding Your Attack Surface
You Should Know what Cyber Resilience means. At Securicom, we place a strong focus on Cyber Resilience —in other words, your...
-
Jul 2, 20252 min read


You Should Know - What does Cyber Resilience mean?
You Should Know: What does Cyber Resilience mean? Here at Securicom, we focus heavily on what Cyber Resilience looks like, what your...
-
Jun 25, 20251 min read


You Should Know - CVEM
You Should Know that while cloud environments—especially multi-cloud and hybrid strategies—offer scalability and efficiency, they also...
-
Jun 11, 20251 min read


The New Era of Security Leadership: Why vCISO Services Are Empowering SMB Growth
vCISO services are more than a stopgap; they actively drive transformation by embedding security into operational and strategic business decisions.
-
Jun 2, 20253 min read


You Should Know - Data Breaches
You Should Know that data breaches remain a major concern, often resulting in monetary losses, harm to an organization’s reputation, and...
-
May 28, 20252 min read


You Should Know - Supply Chain and Third-Party Risk
You Should Know what goes on in your business's security land scape. How can you be sure that your suppliers and partners are not...
-
May 21, 20252 min read


Implementing a Cybersecurity Framework: The Next Step After Engaging a vCISO in South Africa
Why a Framework is Essential—Not Just for Compliance
Too often, cybersecurity is seen as a tick-box exercise for compliance or a response to an incident. We must move beyond this limited viewpoint. A well-chosen and properly implemented framework—such as those aligned with the National Cybersecurity Policy Framework (NCPF) and global standards—anchors security into business operations, fostering agility and resilience as the business evolves.
-
May 19, 20253 min read


Vulnerabilities Aren’t Hiding. You Just Can’t See Them: Rethinking Visibility and the Case for CVEM
Vulnerabilities Aren’t Hiding. You Just Can’t See Them: Rethinking Visibility and the Case for CVEM
-
May 16, 20253 min read


You Should Know - Denial of Service Attacks
You Should Know about DOS (Denial of Service) cyber attacks. 1. DDoS attacks overwhelm systems by flooding them with excessive...
-
May 14, 20252 min read


Why Cyber Resilience is the Competitive Edge South African SMEs Need Now
Cyber resilience is not just about blocking threats. It’s about ensuring your business can adapt, recover, and continue to operate even if something goes wrong.
-
May 12, 20253 min read


CVEM and the South African Reality: Taking Cybersecurity Beyond Box-Ticking
Modern CVEM platforms now include role-based patch approval workflows, aligning remediation actions with internal governance and compliance requirements.
-
May 9, 20252 min read


You Should Know – Insider User Threats
You Should Know that many cybersecurity threats can originate from within your own organization. It's not always easy to be certain that...
-
May 7, 20252 min read


Why Growing (and Even Stable) South African Businesses Need a vCISO Now More Than Ever
In today's digital-first economy, many South African businesses are scaling up—opening new offices, onboarding remote teams, adopting...
-
May 6, 20252 min read


Top 5 Cybersecurity Challenges Solved by Our vCISO Services
As cyber threats grow in complexity and frequency, businesses of all sizes face mounting pressure to protect their data, maintain...
-
Apr 24, 20252 min read


You Should Know - Zero Day Exploit
You Should Know about a type of cyberattack called a "zero-day exploit." Imagine a brand-new house with a secret, undiscovered flaw –...
-
Apr 23, 20251 min read


You Should Know - What is your Security Operations Technology Stack saying?
You Should Know... What Your Security Operations Technology Stack Would Say. If your Security Operations Technology Stack had a chance...
-
Apr 16, 20252 min read
bottom of page



