Mouz

Slot sets standard: 'The bar at Liverpool is always high' as Reds fight for top four and trophies

· Yahoo Sports

Slot sets standard: 'The bar at Liverpool is always high' as Reds fight for top four and trophies

Arne Slot has said the 'bar at Liverpool is always high' after a stuttering second season at Anfield.

Slot won the title in his debut campaign with the club, becoming just the fifth manager to win thePremier League in his first season in England.

Visit solvita.blog for more information.

Liverpool have struggled to replicate those performances in 2025-26 and are currently sixth in the standings, with a battle on to secure Champions League qualification.

Speaking to the media ahead of this weekend's fixture against Tottenham Hotspur at Anfield, Slot was asked whether he felt he had set the bar high after a debut season of success.

The Dutchman insisted that the expectation at Liverpool should always be high, for whoever represents the club.

"The bar at Liverpool is always high, it has always been high and will always be high. We are a top club. The bar should be set high by the people around us, but we will set the bar just as high.

"Indeed, last season we were able to achieve one of the things we wanted to achieve - that was winning the league. We were also close to winning the League Cup, which we lost in the final against Newcastle.

"This season, of course, we are unable to win the league again but we are still in two cups - the Champions League and the FA Cup - where we are competing.

"What I want is that every single player gets the maximum out of every single training session and every game we are playing from now until the end of the season. That is the aim for me and should be the aim for the players and I am 100% sure that is the aim for the players because that is the only way to get the maximum out of what is there and what is in it for us.

"What that is exactly going to be [trophies?] is not always easy for us to say, sometimes you need a little bit of luck...margins at the level we are playing - Champions League,Premier League - are really small. We have to fight for those margins every single day to make them bigger and bigger and bigger.

"That was already the aim at the start of the season and that is even more the aim now."

Read full story at source

SA exposed to cyber security threats amid conflict in Iran

· Citizen

As geopolitical conflict escalates in the Middle East, driving up fuel prices among many other issues, South African cyber networks have become particularly vulnerable to hacking. What does this mean for your network connection, data protection and your company?

Following the arrival of the US cybersecurity company investing in South Africa earlier this year, Palo Alto aims to provide secure networks and job opportunities to combat unemployment and the skills gap.

Visit asg-reflektory.pl for more information.

The regional director for Southern Africa, Justin Lee, says that the cybersecurity network’s Unit 42 is tracking a surge in hacktivist activity and phishing campaigns in the conflict’s wake, causing ripple effects well beyond the region.

ALSO READ: AI is dumping 150-page complaints on finance ombud’s desk

‘A breach every three hours’

Lee says that organisations in South Africa are breached every three hours and that 90% of these cyberattacks are preventable.

“Globally, the time between a network intrusion and data theft has dropped to around 72 minutes, down from 285 minutes in 2024.”

Acknowledging the countries’ significant strides in digital governance, accelerating towards a centralised MyMzanzi platform that was Cabinet-approved, he points out how the attack surface grows just as rapidly as digital ambitions.

According to Unit 42 research, Palo Alto Networks’ threat intelligence division has identified over 750 major incidents across 50 countries, suggesting that the primary drivers of breaches are not sophisticated.

“In 87% of investigated cases, responders had to piece together evidence from two or more separate systems, meaning fragmented defences, not novel techniques, are enabling most attacks.”

Interpol reports show that cybercrime costs South Africa around R2.2 billion every year. Along with the Information Regulator currently receiving around 284 breach notifications monthly.

Complexity

According to Lee, most organisations in South Africa have significantly invested in cybersecurity; however, the problem is that those investments have made things more complicated, not more secure.

“Complexity is the enemy of speed, and right now, complexity is winning.”

The 2026 Unit 42 incident response report shows common trends among nation-state actors, moving beyond espionage to prepositioning within critical infrastructure and establishing footholds that can be activated later. This poses a strategic risk to ports, utilities, and transport networks, especially for a logistical hub like South Africa. The urgency is compounded by a shift in global threat patterns.

“We are seeing actors target the operational technology layers of critical infrastructure.”

Lee says that a fragmented security architecture simply cannot provide the required protection to prevent these breaches.

“These environments often rely on older systems that cannot be easily patched. Securing them requires visibility not just across the IT network, but deep into the industrial control systems that manage essential services.”

“However, with more than nine in ten breaches stemming from preventable gaps, the path forward is clearer than the scale of the problem might suggest,” Lee concluded.

Phishing and Fragmented Defences

Phishing campaigns are hack attacks that are seen as an attempt to steal sensitive information, usually in the form of usernames, passwords, credit card numbers and even banking details. According to Lee, South Africa is particularly exposed after organisations recorded a 60% increase in data breaches in 2025.

Fragmented defences are also known as exposed loopholes in networks that are open to exploitation. Companies are operating under two-thirds of cybersecurity roles, with one-third of these roles being open or “unfilled”. Attempting to manage 57 security tools across 16 vendors is not possible, leaving room for hackers to enter the server.

“With nearly two-thirds of cybersecurity roles currently unfilled, small teams are already stretched thin. In the public sector, fragmented procurement cycles across more than 20 disparate statutes have made consolidation harder still.” Lee says.

Closing “open doors”

Identity-related weaknesses were found in almost 90% of breaches that were investigated by Unit 42. Another report showed that 99% had more access than needed to over 680 000 accounts across cloud environments, and in many of these cases, permissions were unused for over 60 days.

Lee warned that for government bodies handling sensitive citizen data at scale, unmanaged accounts pose a critical exposure risk.

“Attackers are very good at finding ‘open doors’.

“If someone leaves the organisation and their account is still active six months later, that’s an ‘open door’,” he says.

He says that the organisations navigating this environment most effectively are those with reduced complexity, using fewer integrated platforms, relying on routine automated responses, and building consistent visibility across their environments.

“Platformisation is not about ripping everything out and starting again. The goal is a security environment that is simple enough to manage and fast enough to respond.”

Data Protection

As computing power grows, the standards for encryption that are secure today may no longer be secure, meaning that data stolen now could be unlocked in the future.

“It starts with knowing exactly where sensitive data resides and how it is encrypted. If you don’t build the ability to swap out encryption standards today, the cost of retrofitting it later will be prohibitive.”

Organisations operating under the data protection mandates of the Privacy Protection Information Act and the Cybercrimes Act, and building cryptographic flexibility into their architectures, are now facing a question of compliance as much as of security.

READ MORE: The future of travel is AI: What you should know

Read full story at source

Middle East war delays D8 summit in Jakarta, Indonesian foreign ministry says

· NY Post

The conference was originally ​set to ⁠be held on April 13 to 15.

Visit chickenroadslot.lat for more information.

Read full story at source