top of page
Search


Google Fined €50M for GDPR non-compliance
Google was fined €50M (over $56M USD) by the French data protection authority (CNIL) on January 21. This is considered the first big fine...

Joseph Assaf Turner
Jan 22, 20192 min read
Â
Â
Â


Cybersecurity Policy Lifecycle
Policies are the means of execution for the overall cybersecurity strategy. Some discuss how to keep your desk clean of sensitive...

Joseph Assaf Turner
Dec 19, 20183 min read
Â
Â
Â


The Cybersecurity Business Context
When a CISO approaches management for budget and support for a new cybersecurity project he or she has two main approaches: Discuss the...

Joseph Assaf Turner
Nov 9, 20182 min read
Â
Â
Â


Cyber Security Awarenes
Why is employee awareness to the dangers of cyber security so important? Educating your employees on the dangers of cyber security...

Joseph Assaf Turner
Oct 10, 20181 min read
Â
Â
Â


Cyber Security Maturity Model
How advanced is your company in implementing good cyber security measures? How can you gauge this progress? Where is progress...

Joseph Assaf Turner
Sep 18, 20181 min read
Â
Â
Â


IT Best Practices for Cyber Security
Mitigating cyber risk doesn't always involve expensive hi-tech cyber security solutions. Applying common IT best practices can...

Joseph Assaf Turner
Aug 15, 20181 min read
Â
Â
Â


Global Cyber Attack Trends & Patterns
Rise of the Cryptominers One of the more prominent ransomware in these rankings is GlobeImposter, a variant of the Globe ransomware which...

Joseph Assaf Turner
Jul 30, 20181 min read
Â
Â
Â


NIST Cyber Security Framework
Planning a company's cyber security strategy is a considerable undertaking. While 10 years ago an information security manager had 2-3...

Joseph Assaf Turner
Jul 17, 20182 min read
Â
Â
Â


Global Cyber Risk Executive Perception
The ratio of intangible to tangible assets increased more than 5-fold in the past 40 years. Today, good information security means...

Joseph Assaf Turner
Jul 12, 20181 min read
Â
Â
Â


Insider Threat - Categories, Stats and Mitigation
The insider threat is a major one and a few of the worst cyber attacks in 2018 were carried out by insiders. Here's some insight on the...

Joseph Assaf Turner
Jul 9, 20181 min read
Â
Â
Â


10 Tips For Securing Your Windows System
When installing a new Windows machine or securing an existing one, be it a laptop, PC or server, there are important privacy and security...

Joseph Assaf Turner
Jul 5, 20181 min read
Â
Â
Â


10 Biggest Data Breaches for 2018 ...yet
These are the biggest data breaches for the first half of 2018. In hindsight - all of these breaches could have been prevented by use of...

Joseph Assaf Turner
Jul 3, 20181 min read
Â
Â
Â


Become a CISO Rockstar through Collaboration
Becoming great at what you do as a CISO requires you to realize your role as a corporate leader and work with people from other...

Joseph Assaf Turner
Jun 25, 20181 min read
Â
Â
Â


Cyber Killchain
The cyber killchain is a Lockheed-Martin model of a cyber attack, showing the different stages a cyber attack goes through. Here is a...

Joseph Assaf Turner
Jun 21, 20181 min read
Â
Â
Â


5 Security Steps for SMBs
The cost of a cyber attack to an SMB can be devastating Here are 5 steps you can take today!

Joseph Assaf Turner
Jun 20, 20181 min read
Â
Â
Â


Become a CISO Rockstar through Risk Management
The Office of Management and Budget (OMB) released its Federal Cybersecurity Risk Determination Report and Action Plan for May 2018. The...

Joseph Assaf Turner
Jun 4, 20184 min read
Â
Â
Â


GDPR – An Executive-Level Decision
GDPR is Already in Full Effect As of May 25 2018, GDPR is in effect, making any company processing and / or controlling personal data...

Joseph Assaf Turner
May 29, 20183 min read
Â
Â
Â


CISO ROCKSTAR THROUGH STRATEGY
A CISO of a tech company called me last week. Apparently, 3 workstations were infected by ransomware, one of which was infected for about...

Joseph Assaf Turner
May 15, 20184 min read
Â
Â
Â


CISO Rockstar through GDPR
A CISO’s job can be an ungrateful one. KPIs and positive ROIs are extremely hard to come by and proving one’s contribution to the company...

Joseph Assaf Turner
May 10, 20181 min read
Â
Â
Â


Protect your Passwords - Protect your Privacy
If you’re serious about protecting your privacy, the first thing you need to do is to keep your password safe and away from attackers’...

Joseph Assaf Turner
May 9, 20181 min read
Â
Â
Â
bottom of page