NIST Cyber Security Framework

Planning a company's cyber security strategy is a considerable undertaking. While 10 years ago an information security manager had 2-3...

Global Cyber Risk Executive Perception

The ratio of intangible to tangible assets increased more than 5-fold in the past 40 years. Today, good information security means...

10 Tips For Securing Your Windows System

When installing a new Windows machine or securing an existing one, be it a laptop, PC or server, there are important privacy and security...

10 Biggest Data Breaches for 2018 ...yet

These are the biggest data breaches for the first half of 2018. In hindsight - all of these breaches could have been prevented by use of...

Cyber Killchain

The cyber killchain is a Lockheed-Martin model of a cyber attack, showing the different stages a cyber attack goes through. Here is a...

5 Security Steps for SMBs

The cost of a cyber attack to an SMB can be devastating Here are 5 steps you can take today!

GDPR – An Executive-Level Decision

GDPR is Already in Full Effect As of May 25 2018, GDPR is in effect, making any company processing and / or controlling personal data...

CISO ROCKSTAR THROUGH STRATEGY

A CISO of a tech company called me last week. Apparently, 3 workstations were infected by ransomware, one of which was infected for about...

CISO Rockstar through GDPR

A CISO’s job can be an ungrateful one. KPIs and positive ROIs are extremely hard to come by and proving one’s contribution to the company...

Protect Your Privacy (and passwords)

Earlier this month (May 3, 2018) Twitter announced that user passwords were stored as plain text in a log file rather than hashed. As a...

GDPR - Lawful Basis for Processing

You must have a valid lawful basis in order to process personal data. There are six available lawful bases for processing. No single...

Fighting Malware - DiD Style

Since no single solution or technology is impervious to bypass or compromise, it is imperative that the company use multiple layers of...

GDPR - DPO: Know your DPO

Exactly one month to go. Do you know your DPO? Who should appoint a DPO? What makes a good DPO? What are some of the DPO's roles? This is...

QUICK WINS – ENCRYPTION

Prevent Data Leakage Data breaches happen and will continue to happen. There will always be some vulnerability / backdoor /...

Cyber Security Service Offering

CISO as a Service The single most important role in defining a cyber security strategy is the company Chief Information Security Officer....