top of page
Search


Protect Your Privacy (and passwords)
Earlier this month (May 3, 2018) Twitter announced that user passwords were stored as plain text in a log file rather than hashed. As a...

Joseph Assaf Turner
May 8, 20183 min read
Â
Â
Â


GDPR - Lawful Basis for Processing
You must have a valid lawful basis in order to process personal data. There are six available lawful bases for processing. No single...

Joseph Assaf Turner
Apr 30, 20181 min read
Â
Â
Â


Fighting Malware - DiD Style
Since no single solution or technology is impervious to bypass or compromise, it is imperative that the company use multiple layers of...

Joseph Assaf Turner
Apr 26, 20181 min read
Â
Â
Â


GDPR - DPO: Know your DPO
Exactly one month to go. Do you know your DPO? Who should appoint a DPO? What makes a good DPO? What are some of the DPO's roles? This is...

Joseph Assaf Turner
Apr 25, 20181 min read
Â
Â
Â


Become a Rockstar CISO Through Employee Awareness
Rock star CISOs The benefits of employee awareness have been discussed ad nauseam. Both research and experts agree that employee...

Joseph Assaf Turner
Apr 20, 20183 min read
Â
Â
Â


QUICK WINS – ENCRYPTION
Prevent Data Leakage Data breaches happen and will continue to happen. There will always be some vulnerability / backdoor /...

Joseph Assaf Turner
Apr 8, 20183 min read
Â
Â
Â


Cyber Security Service Offering
CISO as a Service The single most important role in defining a cyber security strategy is the company Chief Information Security Officer....

Joseph Assaf Turner
Apr 5, 20182 min read
Â
Â
Â


The Next Cyber Attack is at Your Doorstep
A Frightful Scenario Imagine that tomorrow at 9:30PM your website is attacked and defaced. The beautiful landing page you spent weeks and...

Joseph Assaf Turner
Apr 5, 20182 min read
Â
Â
Â


Cyber Threat Actors
5 types of cyber threat actors 1. Cyber Superpowers 2. State-Sponsored 3. Cyber Criminals 4. Hacktivist / Anarchist 5. Internal Error /...

Joseph Assaf Turner
Mar 27, 20181 min read
Â
Â
Â


Classify Your Data. The Why's and How's
What is Data Classification Cyber security attempts to reduce risk posed to the company by bad actors manipulating company data to their...

Joseph Assaf Turner
Mar 26, 20183 min read
Â
Â
Â


Facebook Breach of Trust? Really?
Facebook Breach of Trust? So Facebook sold information relating to 50 million of its users to Cambridge Analytica. I'm sorry to say this...

Joseph Assaf Turner
Mar 22, 20181 min read
Â
Â
Â


Managers on the Cyber Front Lines
When meeting with IS (Information Security) and IT professionals, senior management and board members sometimes feel overwhelmed. As...

Joseph Assaf Turner
Mar 20, 20184 min read
Â
Â
Â


Why you should happily adopt GDPR
Forget about fines – Here’s why you should adopt GDPR Yes, deadline has been set for May 25, 2018. Yes, fines may reach €20 million or 4%...

Joseph Assaf Turner
Mar 19, 20183 min read
Â
Â
Â


Stopping Cryptominers
In a March 13, 2018 blog post by Imperva’s Elad Erez and Luda Lazar, they revealed an ongoing attack which uses a picture of Scarlett...

Joseph Assaf Turner
Mar 18, 20183 min read
Â
Â
Â


GDPR
GDPR: The Race for Compliance On April 14, 2016 the EU Parliament approved the General Data Protection Regulation – GDPR. This initiative...

Joseph Assaf Turner
Mar 13, 20182 min read
Â
Â
Â


10 Ransomware Facts
Here are 10 facts you should know about ransomware and why it is such a threat.

Joseph Assaf Turner
Mar 12, 20181 min read
Â
Â
Â


3 Steps You Need to Take Towards Cyber Awareness
If you can make just one New Year's resolution - Make it Cyber Awareness This Year The Harsh Facts While attending an ISACA event, this...

Joseph Assaf Turner
Feb 23, 20183 min read
Â
Â
Â


Cybertech 2018: My Cyber-Insights
Starting Monday, January 29, arguably the biggest Cyber Technology event in Israel took place in Tel Aviv. Each year this event lets...

Joseph Assaf Turner
Feb 20, 20183 min read
Â
Â
Â
bottom of page