IT Security Website Security IT Support Secure Hosting Remote Support

July 3, 2019

When Borders, Fences and Vaults can't protect you anymore, who better to Manage and Secure your IT Infrastructure than Cyber Watchdogs Cyber Watchdogs (Pty) Ltd is a trusted provider of Cyber Security, Managed Services, IT Security, Web Security, IT Support and Secure Hosting to various industries, corporations and businesses in Cape Town, South Africa.

Spotlight

CyberWarrior Academy

The CyberWarrior Academy (CWA) is a technical training and job placement program that prepares you for a career in cybersecurity. CWA is a hands-on, intensive training program delivered by cybersecurity practitioners and white-hat hackers who provide you with real-world lessons and experience to successfully navigate the rapidly changing IT Security threat landscape. You’ll develop the technical competency to deliver immediate value, and you’ll learn how to constantly investigate new innovations to keep your skills relevant.

OTHER WHITEPAPERS
news image

The ‘Zero Trust’ Model in Cybersecurity: Towards understanding and deployment

whitePaper | August 24, 2022

In the last couple of years, “zero trust” has gained significant traction in the cybersecurity realm as a means to protect networks and increase security across organizations. In part, the growing popularity of this security model can be attributed to the shift to hybrid working practices that call for a more secure work environment whether on- or off-premises.

Read More
news image

Cybersecurity 2018

whitePaper | February 2, 2020

Small businesses usually neglect cybersecurity as an essential function making their IT infrastructure vulnerable. IT security issues often cost companies a lot of money and downtime every year. Even if the IT infrastructure consists of couple laptops and Devices, cybersecurity should always be a top priority.

Read More
news image

Project Blackfin: Automated Breach Detection Using Intelligent Agents

whitePaper | December 4, 2019

This paper describes a distributed anomaly detection approach designed to accurately track actions performed by adversaries across a network. The illustrated approach involves running multiple machine learning models on both endpoints and the network as well as on a centralized backend, and includes communication and replication of learned states between these models.

Read More
news image

Cross-Generational Security Of Mobile Telephony

whitePaper | August 4, 2022

Abstract— With the recent roll-outs of 5G networks and the rise of phones supporting the standard, it’s critical to examine the technical underpinnings of 5G system security. The fifth generation of 3GPP (3rd Generation Partnership Project) mobile telephony, the lack of understanding, outright hostility, and general confusion surrounding this roll-out is unmatched in the history of mobility. We aim to alleviate much of the confusion and hostility by providing an overarching description and security document.

Read More
news image

Network Traffic Analysis (NTA): A Cybersecurity ‘Quick Win’

whitePaper | February 27, 2020

According to research from ESG and the Information Systems Security Association (ISSA), 91% of cybersecurity professionals believe that most organizations are either extremely or somewhat vulnerable to a significant cyber-attack or data breach.1 This level of cyber-risk demands immediate attention and action from CISOs, CIOs, and business executives. As a result, 62% of organizations plan to increase cybersecurity spending in 2020.2 Here’s the problem: Increasing security budgets alone isn’t enough. CISOs need quick and easy wins that can greatly bolster security efficacy and streamline operations without demanding massive projects and vast resources. There is a lot of work ahead. This white paper concludes.

Read More
news image

Scenarios for the Future of Cybercrime - White Paper for Decision Makers

whitePaper | January 28, 2020

Project 2020 is an initiative of the International Cyber Security Protection Alliance (ICSPA). Its aim is to anticipate the future of cybercrime, enabling governments, businesses and citizens to prepare themselves for the challenges and opportunities of the coming decade. It comprises a range of activities, including common threat reporting, scenario exercises, policy guidance and capacity building.

Read More

Spotlight

CyberWarrior Academy

The CyberWarrior Academy (CWA) is a technical training and job placement program that prepares you for a career in cybersecurity. CWA is a hands-on, intensive training program delivered by cybersecurity practitioners and white-hat hackers who provide you with real-world lessons and experience to successfully navigate the rapidly changing IT Security threat landscape. You’ll develop the technical competency to deliver immediate value, and you’ll learn how to constantly investigate new innovations to keep your skills relevant.

Events