top of page

The Cost of a Data Breach

A recent research by Ponemon Institute and IBM studied 550 organizations impacted by data breaches that occurred between March 2021 and...

How You Can Support Your CISO

With so much anxiety and uncertainty all around the world – this is the time your CISO needs you. Most of your staff are out of the...

Cybersecurity in the time of the latest Coronavirus

The rapid spread of Coronavirus (COVID-19) has hit governments, businesses, and people across the globe. With stock prices plummeting, facto

Google Fined €50M for GDPR non-compliance

Google was fined €50M (over $56M USD) by the French data protection authority (CNIL) on January 21. This is considered the first big fine...

Cybersecurity Policy Lifecycle

Policies are the means of execution for the overall cybersecurity strategy. Some discuss how to keep your desk clean of sensitive...

Cyber Security Awarenes

Why is employee awareness to the dangers of cyber security so important? Educating your employees on the dangers of cyber security...

Global Cyber Attack Trends & Patterns

Rise of the Cryptominers One of the more prominent ransomware in these rankings is GlobeImposter, a variant of the Globe ransomware which...

Global Cyber Risk Executive Perception

The ratio of intangible to tangible assets increased more than 5-fold in the past 40 years. Today, good information security means...

10 Tips For Securing Your Windows System

When installing a new Windows machine or securing an existing one, be it a laptop, PC or server, there are important privacy and security...

10 Biggest Data Breaches for 2018 ...yet

These are the biggest data breaches for the first half of 2018. In hindsight - all of these breaches could have been prevented by use of...

Become a CISO Rockstar through Collaboration

Becoming great at what you do as a CISO requires you to realize your role as a corporate leader and work with people from other...

Cyber Killchain

The cyber killchain is a Lockheed-Martin model of a cyber attack, showing the different stages a cyber attack goes through. Here is a...

5 Security Steps for SMBs

The cost of a cyber attack to an SMB can be devastating Here are 5 steps you can take today!

Become a CISO Rockstar through Risk Management

The Office of Management and Budget (OMB) released its Federal Cybersecurity Risk Determination Report and Action Plan for May 2018. The...

GDPR – An Executive-Level Decision

GDPR is Already in Full Effect As of May 25 2018, GDPR is in effect, making any company processing and / or controlling personal data...

CISO Rockstar through GDPR

A CISO’s job can be an ungrateful one. KPIs and positive ROIs are extremely hard to come by and proving one’s contribution to the company...

Protect your Passwords - Protect your Privacy

If you’re serious about protecting your privacy, the first thing you need to do is to keep your password safe and away from attackers’...

Fighting Malware - DiD Style

Since no single solution or technology is impervious to bypass or compromise, it is imperative that the company use multiple layers of...

bottom of page