top of page

Cybersecurity Policy Lifecycle

Policies are the means of execution for the overall cybersecurity strategy. Some discuss how to keep your desk clean of sensitive...

The Cybersecurity Business Context

When a CISO approaches management for budget and support for a new cybersecurity project he or she has two main approaches: Discuss the...

Cyber Security Awarenes

Why is employee awareness to the dangers of cyber security so important? Educating your employees on the dangers of cyber security...

Cyber Security Maturity Model

How advanced is your company in implementing good cyber security measures? How can you gauge this progress? Where is progress...

IT Best Practices for Cyber Security

Mitigating cyber risk doesn't always involve expensive hi-tech cyber security solutions. Applying common IT best practices can...

Global Cyber Attack Trends & Patterns

Rise of the Cryptominers One of the more prominent ransomware in these rankings is GlobeImposter, a variant of the Globe ransomware which...

NIST Cyber Security Framework

Planning a company's cyber security strategy is a considerable undertaking. While 10 years ago an information security manager had 2-3...

Global Cyber Risk Executive Perception

The ratio of intangible to tangible assets increased more than 5-fold in the past 40 years. Today, good information security means...

Insider Threat - Categories, Stats and Mitigation

The insider threat is a major one and a few of the worst cyber attacks in 2018 were carried out by insiders. Here's some insight on the...

10 Tips For Securing Your Windows System

When installing a new Windows machine or securing an existing one, be it a laptop, PC or server, there are important privacy and security...

10 Biggest Data Breaches for 2018 ...yet

These are the biggest data breaches for the first half of 2018. In hindsight - all of these breaches could have been prevented by use of...

Become a CISO Rockstar through Collaboration

Becoming great at what you do as a CISO requires you to realize your role as a corporate leader and work with people from other...

Cyber Killchain

The cyber killchain is a Lockheed-Martin model of a cyber attack, showing the different stages a cyber attack goes through. Here is a...

5 Security Steps for SMBs

The cost of a cyber attack to an SMB can be devastating Here are 5 steps you can take today!

Become a CISO Rockstar through Risk Management

The Office of Management and Budget (OMB) released its Federal Cybersecurity Risk Determination Report and Action Plan for May 2018. The...

GDPR – An Executive-Level Decision

GDPR is Already in Full Effect As of May 25 2018, GDPR is in effect, making any company processing and / or controlling personal data...

CISO ROCKSTAR THROUGH STRATEGY

A CISO of a tech company called me last week. Apparently, 3 workstations were infected by ransomware, one of which was infected for about...

CISO Rockstar through GDPR

A CISO’s job can be an ungrateful one. KPIs and positive ROIs are extremely hard to come by and proving one’s contribution to the company...

Protect your Passwords - Protect your Privacy

If you’re serious about protecting your privacy, the first thing you need to do is to keep your password safe and away from attackers’...

Protect Your Privacy (and passwords)

Earlier this month (May 3, 2018) Twitter announced that user passwords were stored as plain text in a log file rather than hashed. As a...

bottom of page