Armd Logo V05 Trim
  • Home
  • Products
  • Regulatory
  • Blog
  • Resources
  • About
  • Contact
  • Partner Program

Blog

  • Why Cybersecurity Is Starting to Look Like Financial Hygiene

    Why Cybersecurity Is Starting to Look Like Financial Hygiene

    7 January, 2026

    A Shift in Expectations Is Already Underway Cybersecurity is no longer treated…

    READ MORE

  • The Silo That May Save Your Business

    The Silo That May Save Your Business

    5 December, 2025

    Why separating work and personal email matters Email is the primary doorway…

    READ MORE

  • Cyber Insurance: Why Proactive Businesses Will Have the Advantage in 2026

    Cyber Insurance: Why Proactive Businesses Will Have the Advantage in 2026

    19 November, 2025

    Proactiveness Is Becoming the New Standard. Cyber insurance has changed noticeably over…

    READ MORE

  • Cybersecurity Awareness Month: What SA Businesses Should Do

    Cybersecurity Awareness Month: What SA Businesses Should Do

    13 October, 2025

    Your Annual Cyber Stress Test October isn’t just Cybersecurity Awareness Month. It’s…

    READ MORE

  • South Africa’s National Security Strategy: Cybersecurity for Business

    South Africa’s National Security Strategy: Cybersecurity for Business

    17 September, 2025

    Introduction South Africa’s National Security Strategy (NSS) was made public on July…

    READ MORE

  • SAA Cyberattack & Resilience: Why Every Business Needs CyberProfiler Now

    SAA Cyberattack & Resilience: Why Every Business Needs CyberProfiler Now

    14 August, 2025

    In May 2025, South African Airways (SAA) experienced a disruptive cyberattack that…

    READ MORE

  • ARMD.digital Website Recognised by DesignRush for Best Technology Design

    ARMD.digital Website Recognised by DesignRush for Best Technology Design

    5 August, 2025

    We’re happy to share that DesignRush has selected the ARMD.digital website as…

    READ MORE

  • Don’t Be the Weak Link: Manage Your Supply Chain Cyber Risk

    Don’t Be the Weak Link: Manage Your Supply Chain Cyber Risk

    22 July, 2025

    Supply chain cyber risk is rising fast – and here’s the part…

    READ MORE

  • AI in Cybersecurity: The Double-Edged Sword

    AI in Cybersecurity: The Double-Edged Sword

    10 June, 2025

    Introduction Artificial intelligence (AI) is revolutionizing both cybersecurity and cyber-attacks. On one…

    READ MORE

  • Microsoft Enforces Stricter Rules for Bulk Email Senders

    Microsoft Enforces Stricter Rules for Bulk Email Senders

    12 May, 2025

    Following Google and Yahoo, Microsoft now requires DMARC for bulk senders to…

    READ MORE

  • Safeguarding Payment Card Data

    Safeguarding Payment Card Data

    10 April, 2025

    What Every Business Needs to Know About PCI DSS v4.0 and Email…

    READ MORE

  • Scenario Analysis – Delict in the Case of DMARC

    Scenario Analysis – Delict in the Case of DMARC

    11 March, 2025

    How an omission in fundamental email protection might lead to delictual liability…

    READ MORE

  • Where Delict and Cyber Security Meet

    Where Delict and Cyber Security Meet

    27 February, 2025

    How Cyber Incidents May Trigger Legal Responsibility With cybercrime on the rise…

    READ MORE

  • 6 Cybersecurity Strategies to Combat Malicious AI

    6 Cybersecurity Strategies to Combat Malicious AI

    23 January, 2025

    Artificial Intelligence (AI) has revolutionized industries, bringing incredible advancements in automation, analytics,…

    READ MORE

  • Avoid Holiday Scams: How to Spot and Stop Cyber Threats During the Festive Season

    Avoid Holiday Scams: How to Spot and Stop Cyber Threats During the Festive Season

    11 December, 2024

    The holiday season is a time of celebration – it’s a time…

    READ MORE

  • The Link Between Reputation Management & Cybersecurity

    The Link Between Reputation Management & Cybersecurity

    11 November, 2024

    Brand reputation is everything. Companies spend years, sometimes decades, cultivating a positive…

    READ MORE

  • October is Cybersecurity Awareness Month: What Every CEO Needs to Know

    October is Cybersecurity Awareness Month: What Every CEO Needs to Know

    14 October, 2024

    As we enter October, also known as Cybersecurity Awareness Month in the…

    READ MORE

  • Email Spam Security: Anti-Spam is Not Enough

    Email Spam Security: Anti-Spam is Not Enough

    26 September, 2024

    Email remains one of the most commonly used communication methods for both…

    READ MORE

  • How Cybersecurity Really Works

    How Cybersecurity Really Works

    28 August, 2024

    Cybersecurity is a critical aspect of protecting our personal and professional lives.…

    READ MORE

  • Risk Mitigation and Risk Avoidance: What’s the Difference?

    Risk Mitigation and Risk Avoidance: What’s the Difference?

    29 July, 2024

    Businesses face a multitude of cybersecurity threats every day. Understanding how to…

    READ MORE

  • North Korean Cyber Actors Exploiting Weak DMARC Policies

    North Korean Cyber Actors Exploiting Weak DMARC Policies

    4 June, 2024

    Cybersecurity experts along with the FBI, the U.S. Department of State, and…

    READ MORE

  • 10 Cyber Security Tips for Employees

    10 Cyber Security Tips for Employees

    22 May, 2024

    Every employee, regardless of their role or seniority, plays a crucial part…

    READ MORE

  • Cybersecurity in South Africa: The Remote Work Era

    Cybersecurity in South Africa: The Remote Work Era

    19 April, 2024

    As we continue to accommodate the remote work era, the approach to…

    READ MORE

  • 5 Very Basic Cyber Security Measures for Companies

    5 Very Basic Cyber Security Measures for Companies

    28 March, 2024

    Did you know, when it comes to cyber security measures, people often…

    READ MORE

1 2
Next Page→

Advance Risk Mitigation Digital

Proactive cybersecurity for the
connected world.

Products
Regulatory Environment
Blog
Cyber Recources

About Us
Contact Us
Partner Program

Copyright 2025 ARMD.digital TM | All Rights Reserved

Trust Centre

Privacy Policy

↑
Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}
Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}

Your cart (items: 0)

Products in cart

Product Details Total
Subtotal $0.00
Taxes and discounts calculated at checkout.
View my cart
Go to checkout

Your basket is currently empty!

Start shopping