• +27 (0) 10 221 1341
  • admin@ndt.co.za
Twitter Linkedin Instagram
  • Home
  • About Us
  • Clients
  • Services
    • Biometrics
    • Cyber Security
    • Software Development & Testing
    • Frameworks, Prototypes And Designs
    • Certification Training
  • Upcoming Training
  • News & Insights
  • Get In Touch

  • Home
  • About Us
  • Clients
  • Services
    • Biometrics
    • Cyber Security
    • Software Development & Testing
    • Frameworks, Prototypes And Designs
    • Certification Training
  • Upcoming Training
  • News & Insights
  • Get In Touch

Blog

Cyber security  ·  Information security controls
Security Tools Alone Don’t Protect You — Control Effectiveness Does

According to research, 61% of security leaders reported suffering a breach due to failed or misconfigured controls over the past 12 months. This is despite having an average of 43 cybersecurity tools in place. This massive rate of security failure […]

by Sigmateq Team

Continue Reading

Network Security
Ten Critical Network Pentest Findings IT Teams Overlook

Organizations often assume that firewalls, endpoint protection, and SIEMs are enough to keep them secure. But how effective are these defences when put to the test? This article covers the ten most critical internal network security risks, breaking down what […]

by Sigmateq Team

Continue Reading

Cyber security
How to Protect Your Business from Cyber Threats: Mastering the Shared Responsibility Model

Cybersecurity isn’t just another checkbox on your business agenda. It’s a fundamental pillar of survival. As organizations increasingly migrate their operations to the cloud, understanding how to protect your digital assets becomes crucial. The shared responsibility model, exemplified through Microsoft 365’s […]

by Sigmateq Team

Continue Reading

Cyber security
Outsmarting Cyber Threats with Attack Graphs

Cyber threats are growing more sophisticated, and traditional security approaches struggle to keep up. Organizations can no longer rely on periodic assessments or static vulnerability lists to stay secure. Instead, they need a dynamic approach that provides real-time insights into […]

by Sigmateq Team

Continue Reading

Cyber security  ·  Databases
PostgreSQL Vulnerability Exploited Alongside BeyondTrust Zero-Day in Targeted Attacks

Threat actors who were behind the exploitation of a Zero-Day vulnerability in BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) products in December 2024 likely also exploited a previously unknown SQL injection flaw in PostgreSQL, according to findings from […]

by Sigmateq Team

Continue Reading

Access Management  ·  Cyber security
The Evolving Role of PAM in Cybersecurity Leadership Agendas for 2025

Privileged Access Management (PAM) has emerged as a cornerstone of modern cybersecurity strategies, shifting from a technical necessity to a critical pillar in leadership agendas. With the PAM market projected to reach $42.96 billion by 2037 (according to Research Nester), […]

by Sigmateq Team

Continue Reading

Encryption  ·  Quantum computing
How Businesses Can Safeguard Operations From Quantum Threat

Defending against quantum computing threat to current encryption methodologies requires a multi-layered, defense-in-depth approach. Recent advances in quantum computing, sensing and communications capabilities promise to deliver a step-change in digital infrastructure and services across industries, societies and governments. At the […]

by Sigmateq Team

Continue Reading

Artificial Intelligence  ·  Cyber security
How to Protect Your Organization from AI Threats

AI is reshaping the world in front of our very eyes, and it’s not always for the better. Yes, it provides new and effective ways to defend against threats, but it’s also turbocharging cybercriminals. Attacks are becoming faster, smarter, and […]

by Sigmateq Team

Continue Reading

Artificial Intelligence  ·  Cyber security
Top 10 Cybersecurity Trends to Expect in 2025

The 2025 cybersecurity landscape is increasingly complex, driven by sophisticated cyber threats, increased regulation, and rapidly evolving technology. In 2025, organizations will be challenged with protecting sensitive information for their customers while continuing to provide seamless and easy user experiences. […]

by Sigmateq Team

Continue Reading

Cyber security  ·  Network Security
Hackers Exploiting Critical Fortinet EMS Vulnerability to Deploy Remote Access Tools

A now-patched critical security flaw impacting Fortinet FortiClient EMS is being exploited by malicious actors as part of a cyber campaign that installed remote desktop software such as AnyDesk and ScreenConnect. The vulnerability in question is CVE-2023-48788 (CVSS score: 9.3), […]

by Sigmateq Team

Continue Reading

12345
Page 2 of 5
  • Recent Posts

    • PECB ISO 22301 Certification Training: 17 – 21 November 2025
    • Link between Business Continuity and Cybersecurity
    • PECB ISO 27001 Certification Course: 17 – 21 Novembre 2025
    • FunkLocker Ransomware Detection: FunkSec Operators Leverage AI to Target U.S., Europe, and Asia
    • PECB ISO 22301 Certification Training – Why Is Business Continuity Important?
  • Recent Comments

    No comments to show.

Contact

  • info@sigmateq.co.za
  • +27 87 153 8656
  • sigmateq.co.za

Address

  • #32, Private Bag X9976 Sandton 2146

Explore

  • Home
  • About
  • Services
  • News
  • Contact
Copyright © 2000 - 2022 Siqmateq, All Right Reserved.