The Cost of a Data Breach

A recent research by Ponemon Institute and IBM studied 550 organizations impacted by data breaches that occurred between March 2021 and...

Shana Tova -Happy New Year

To our customers, partners and friends: Shana Tova - Happy New Year. Thank you for a wonderful year. Wishing each day of the new year be...

Same Facebook - New Algorithm

A couple of months ago I watched a documentary called The Social Dilemma. Featuring ex-executives from the social networking industry and...

Thank You Healthcare Providers

Doctors, nurses, healthcare providers around the world. These days, you are the ones tirelessly working for us while we’re under lockdown...

The upside of the crisis

In a conversation with a client CIO, they talked about how, due to the COVID19 epidemic, they needed to provide many employees the...

Managing Cybersecurity in Times of Crisis

It seems that only a few weeks ago we all had plans, we had our routine, and then – COVID-19 The rising uncertainty has stopped many...

How You Can Support Your CISO

With so much anxiety and uncertainty all around the world – this is the time your CISO needs you. Most of your staff are out of the...

Cybersecurity Policy Lifecycle

Policies are the means of execution for the overall cybersecurity strategy. Some discuss how to keep your desk clean of sensitive...

The Cybersecurity Business Context

When a CISO approaches management for budget and support for a new cybersecurity project he or she has two main approaches: Discuss the...

Cyber Security Awarenes

Why is employee awareness to the dangers of cyber security so important? Educating your employees on the dangers of cyber security...

Cyber Security Maturity Model

How advanced is your company in implementing good cyber security measures? How can you gauge this progress? Where is progress...

IT Best Practices for Cyber Security

Mitigating cyber risk doesn't always involve expensive hi-tech cyber security solutions. Applying common IT best practices can...