Whitepapers

This page features technical and business related whitepapers covering a range of information security domains.


Addressing The Cyber Security Skills Gap
The importance of cyber security has become an undeniable fact. Every day we hear projections and reports about the growth of the cyber security industry on the one side and the skills gap that needs to be filled by that industry on the other. On the one hand we read about the importance of cyber security while on the other we read about how far we are from achieving it! According to the International Data Corporation (IDC), the premier global provider of market intelligence, worldwide revenue for security technology is to surpass $100 Billion in 2020, with the security training and certification market alone being worth over two-billion dollars. [1] Yet, employers from every corner of the world and from every industry lament the lack of skilled professionals in cyber security.

In order to try and solve the security skills gap it is important to clearly define the problem and to identify the challenges that must be overcome to fill that gap. In this paper we take a closer look at the Cybersecurity Skills Gap and what can be done at national level to try and fill it.

Jun 29, 2017

Threats and Vulnerabilities to Corporate Databases
Every cyber attack, whether from internal or external users is aimed at gaining unauthorized access to sensitive data stored inside corporate databases. Also, most business services today are delivered through the Web and the most serious attacks to Web applications themselves are aimed at gaining unauthorized access to the underlying database technologies. Unfortunately, many organizations do not give adequate attention to securing their corporate databases and many attacks and misuse go unnoticed until it is too late. In order to understand how to protect corporate databases, it is important to thoroughly understand the range of weaknesses and threats that are challenging such vital technology.

Jul 02, 2015

Threats and Vulnerabilities to Corporate Databases
Social media platforms create an avenue for people to connect and share information with each other over the internet. These include wikis, blogs, social networking sites such as Facebook, Twitter, LinkedIn, Google Plus, Instagram, Snapchat, Tumbler, WhatsApp etc.
These websites can however pose a threat to individuals, ranging from young kids, teenagers and even adults, all who have access to the social networking sites and hence are susceptible to a myriad of threat actors.
It is therefore important for society at large, beginning with the basic unit, the family, to implement sound security practices and create necessary security awareness for children so as to reduce the exposure & risk associated with social media platforms. This guide covers what you need to know and issues to raise with kids about living their lives online.
Hence the launch of this campaign dubbed, “I’m Social and Secure”.

Sep 22, 2015

Silensec Africa

Feel free to contact us if you have any problems.

Silensec UK

Feel free to contact us if you have any problems.