Cybersecurity Policy Lifecycle
Policies are the means of execution for the overall cybersecurity strategy. Some discuss how to keep your desk clean of sensitive...
Policies are the means of execution for the overall cybersecurity strategy. Some discuss how to keep your desk clean of sensitive...
When a CISO approaches management for budget and support for a new cybersecurity project he or she has two main approaches: Discuss the...
Why is employee awareness to the dangers of cyber security so important? Educating your employees on the dangers of cyber security...
How advanced is your company in implementing good cyber security measures? How can you gauge this progress? Where is progress...
Mitigating cyber risk doesn't always involve expensive hi-tech cyber security solutions. Applying common IT best practices can...
Rise of the Cryptominers One of the more prominent ransomware in these rankings is GlobeImposter, a variant of the Globe ransomware which...
Planning a company's cyber security strategy is a considerable undertaking. While 10 years ago an information security manager had 2-3...
The ratio of intangible to tangible assets increased more than 5-fold in the past 40 years. Today, good information security means...
The insider threat is a major one and a few of the worst cyber attacks in 2018 were carried out by insiders. Here's some insight on the...
When installing a new Windows machine or securing an existing one, be it a laptop, PC or server, there are important privacy and security...
These are the biggest data breaches for the first half of 2018. In hindsight - all of these breaches could have been prevented by use of...
Becoming great at what you do as a CISO requires you to realize your role as a corporate leader and work with people from other...
The cyber killchain is a Lockheed-Martin model of a cyber attack, showing the different stages a cyber attack goes through. Here is a...
The cost of a cyber attack to an SMB can be devastating Here are 5 steps you can take today!
The Office of Management and Budget (OMB) released its Federal Cybersecurity Risk Determination Report and Action Plan for May 2018. The...
GDPR is Already in Full Effect As of May 25 2018, GDPR is in effect, making any company processing and / or controlling personal data...
A CISO of a tech company called me last week. Apparently, 3 workstations were infected by ransomware, one of which was infected for about...
A CISO’s job can be an ungrateful one. KPIs and positive ROIs are extremely hard to come by and proving one’s contribution to the company...
If you’re serious about protecting your privacy, the first thing you need to do is to keep your password safe and away from attackers’...
Earlier this month (May 3, 2018) Twitter announced that user passwords were stored as plain text in a log file rather than hashed. As a...