Shana Tova -Happy New Year

To our customers, partners and friends: Shana Tova - Happy New Year. Thank you for a wonderful year. Wishing each day of the new year be...

Same Facebook - New Algorithm

A couple of months ago I watched a documentary called The Social Dilemma. Featuring ex-executives from the social networking industry and...

Thank You Healthcare Providers

Doctors, nurses, healthcare providers around the world. These days, you are the ones tirelessly working for us while we’re under lockdown...

The upside of the crisis

In a conversation with a client CIO, they talked about how, due to the COVID19 epidemic, they needed to provide many employees the...

How You Can Support Your CISO

With so much anxiety and uncertainty all around the world – this is the time your CISO needs you. Most of your staff are out of the...

Cybersecurity Policy Lifecycle

Policies are the means of execution for the overall cybersecurity strategy. Some discuss how to keep your desk clean of sensitive...

The Cybersecurity Business Context

When a CISO approaches management for budget and support for a new cybersecurity project he or she has two main approaches: Discuss the...

Cyber Security Awarenes

Why is employee awareness to the dangers of cyber security so important? Educating your employees on the dangers of cyber security...

Cyber Security Maturity Model

How advanced is your company in implementing good cyber security measures? How can you gauge this progress? Where is progress...

IT Best Practices for Cyber Security

Mitigating cyber risk doesn't always involve expensive hi-tech cyber security solutions. Applying common IT best practices can...

Global Cyber Attack Trends & Patterns

Rise of the Cryptominers One of the more prominent ransomware in these rankings is GlobeImposter, a variant of the Globe ransomware which...

NIST Cyber Security Framework

Planning a company's cyber security strategy is a considerable undertaking. While 10 years ago an information security manager had 2-3...