top of page

The Cost of a Data Breach

A recent research by Ponemon Institute and IBM studied 550 organizations impacted by data breaches that occurred between March 2021 and...

How You Can Support Your CISO

With so much anxiety and uncertainty all around the world – this is the time your CISO needs you. Most of your staff are out of the...

Cybersecurity Policy Lifecycle

Policies are the means of execution for the overall cybersecurity strategy. Some discuss how to keep your desk clean of sensitive...

Cyber Security Awarenes

Why is employee awareness to the dangers of cyber security so important? Educating your employees on the dangers of cyber security...

Global Cyber Attack Trends & Patterns

Rise of the Cryptominers One of the more prominent ransomware in these rankings is GlobeImposter, a variant of the Globe ransomware which...

Global Cyber Risk Executive Perception

The ratio of intangible to tangible assets increased more than 5-fold in the past 40 years. Today, good information security means...

10 Tips For Securing Your Windows System

When installing a new Windows machine or securing an existing one, be it a laptop, PC or server, there are important privacy and security...

10 Biggest Data Breaches for 2018 ...yet

These are the biggest data breaches for the first half of 2018. In hindsight - all of these breaches could have been prevented by use of...

Cyber Killchain

The cyber killchain is a Lockheed-Martin model of a cyber attack, showing the different stages a cyber attack goes through. Here is a...

5 Security Steps for SMBs

The cost of a cyber attack to an SMB can be devastating Here are 5 steps you can take today!

GDPR – An Executive-Level Decision

GDPR is Already in Full Effect As of May 25 2018, GDPR is in effect, making any company processing and / or controlling personal data...

CISO Rockstar through GDPR

A CISO’s job can be an ungrateful one. KPIs and positive ROIs are extremely hard to come by and proving one’s contribution to the company...

Fighting Malware - DiD Style

Since no single solution or technology is impervious to bypass or compromise, it is imperative that the company use multiple layers of...

GDPR - DPO: Know your DPO

Exactly one month to go. Do you know your DPO? Who should appoint a DPO? What makes a good DPO? What are some of the DPO's roles? This is...

bottom of page