• +27 (0) 10 221 1341
  • admin@ndt.co.za
Twitter Linkedin Instagram
  • Home
  • About Us
  • Clients
  • Services
    • Biometrics
    • Cyber Security
    • Software Development & Testing
    • Frameworks, Prototypes And Designs
    • Certification Training
  • Upcoming Training
  • News & Insights
  • Get In Touch

  • Home
  • About Us
  • Clients
  • Services
    • Biometrics
    • Cyber Security
    • Software Development & Testing
    • Frameworks, Prototypes And Designs
    • Certification Training
  • Upcoming Training
  • News & Insights
  • Get In Touch

Blog

Cyber security  ·  Endpoint security
EDR Detects, EPM Prevents. Why Using Both is a Winning Formula for Modern Endpoint Protection

For many years, EPM and EDR have been hailed as critical toolsets when it comes to protecting endpoints. Yet, they cover vastly different stages of the attack lifecycle. Endpoint Detection and Response is designed to detect and respond to real-time […]

by Sigmateq Team

Continue Reading

Cyber security  ·  Network Security
Pen Testing for Compliance Only? It is Time to Change Your Approach

The shortfalls of compliance testing have made organizations to realize that point-in-time compliance testing can’t protect against vulnerabilities introduced after the assessment. According to Verizons 2025 Data Breach Investigation Report, the exploitation of vulnerabilities rose 34% year-over-year. While compliance frameworks […]

by Sigmateq Team

Continue Reading

Artificial Intelligence  ·  Cyber Defence  ·  Zero Trust
Rethinking Cyber Defense with Zero Trust + AI

Businesses are firmly in attackers’ crosshairs. Financially motivated cybercriminals conduct ransomware attacks with record-breaking ransoms being paid by companies seeking to avoid business interruption. Others, including nation-state hackers, infiltrate companies to steal intellectual property and trade secrets to gain commercial […]

by Sigmateq Team

Continue Reading

Cyber security  ·  Information security controls
Security Tools Alone Don’t Protect You — Control Effectiveness Does

According to research, 61% of security leaders reported suffering a breach due to failed or misconfigured controls over the past 12 months. This is despite having an average of 43 cybersecurity tools in place. This massive rate of security failure […]

by Sigmateq Team

Continue Reading

Network Security
Ten Critical Network Pentest Findings IT Teams Overlook

Organizations often assume that firewalls, endpoint protection, and SIEMs are enough to keep them secure. But how effective are these defences when put to the test? This article covers the ten most critical internal network security risks, breaking down what […]

by Sigmateq Team

Continue Reading

Cyber security
How to Protect Your Business from Cyber Threats: Mastering the Shared Responsibility Model

Cybersecurity isn’t just another checkbox on your business agenda. It’s a fundamental pillar of survival. As organizations increasingly migrate their operations to the cloud, understanding how to protect your digital assets becomes crucial. The shared responsibility model, exemplified through Microsoft 365’s […]

by Sigmateq Team

Continue Reading

Cyber security
Outsmarting Cyber Threats with Attack Graphs

Cyber threats are growing more sophisticated, and traditional security approaches struggle to keep up. Organizations can no longer rely on periodic assessments or static vulnerability lists to stay secure. Instead, they need a dynamic approach that provides real-time insights into […]

by Sigmateq Team

Continue Reading

Cyber security  ·  Databases
PostgreSQL Vulnerability Exploited Alongside BeyondTrust Zero-Day in Targeted Attacks

Threat actors who were behind the exploitation of a Zero-Day vulnerability in BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) products in December 2024 likely also exploited a previously unknown SQL injection flaw in PostgreSQL, according to findings from […]

by Sigmateq Team

Continue Reading

Access Management  ·  Cyber security
The Evolving Role of PAM in Cybersecurity Leadership Agendas for 2025

Privileged Access Management (PAM) has emerged as a cornerstone of modern cybersecurity strategies, shifting from a technical necessity to a critical pillar in leadership agendas. With the PAM market projected to reach $42.96 billion by 2037 (according to Research Nester), […]

by Sigmateq Team

Continue Reading

Encryption  ·  Quantum computing
How Businesses Can Safeguard Operations From Quantum Threat

Defending against quantum computing threat to current encryption methodologies requires a multi-layered, defense-in-depth approach. Recent advances in quantum computing, sensing and communications capabilities promise to deliver a step-change in digital infrastructure and services across industries, societies and governments. At the […]

by Sigmateq Team

Continue Reading

1234
Page 1 of 4
  • Recent Posts

    • EDR Detects, EPM Prevents. Why Using Both is a Winning Formula for Modern Endpoint Protection
    • Pen Testing for Compliance Only? It is Time to Change Your Approach
    • Rethinking Cyber Defense with Zero Trust + AI
    • Security Tools Alone Don’t Protect You — Control Effectiveness Does
    • Ten Critical Network Pentest Findings IT Teams Overlook
  • Recent Comments

    No comments to show.

Contact

  • info@sigmateq.co.za
  • +27 87 153 8656
  • sigmateq.co.za

Address

  • #32, Private Bag X9976 Sandton 2146

Explore

  • Home
  • About
  • Services
  • News
  • Contact
Copyright © 2000 - 2022 Siqmateq, All Right Reserved.