Threat Intelligence: Zero to One

[vc_row css=".vc_custom_1452687555475{margin-bottom: 100px !important;}"][vc_column offset="vc_col-lg-9 vc_col-md-9" css=".vc_custom_1452702342137{padding-right: 45px !important;}"][vc_custom_heading source="post_title" use_theme_fonts="yes" el_class="no_stripe"][stm_post_details][vc_column_text css=".vc_custom_1487437655761{margin-bottom: 20px !important;}" el_class="no_stripe"]   Introduction Today, the biggest gap in the cyber security of organizations is that companies work in isolation while criminals are working in collaboration.…

The role of the CISO, the CIO and the Board

[vc_row css=".vc_custom_1452687555475{margin-bottom: 100px !important;}"][vc_column offset="vc_col-lg-9 vc_col-md-9" css=".vc_custom_1452702342137{padding-right: 45px !important;}"][vc_custom_heading source="post_title" use_theme_fonts="yes" el_class="no_stripe"][stm_post_details][vc_column_text css=".vc_custom_1487434916179{margin-bottom: 20px !important;}" el_class="no_stripe"]   Digital Transformation vs. Organisational Legacy The hybrid role of the CISO Beyond the functional distinctions we analysed in our reporting line article (CISO…

How to Apply Proper Risk Management Methodology on Information Security?

[vc_row css=".vc_custom_1452687555475{margin-bottom: 100px !important;}"][vc_column offset="vc_col-lg-9 vc_col-md-9" css=".vc_custom_1452702342137{padding-right: 45px !important;}"][vc_custom_heading source="post_title" use_theme_fonts="yes" el_class="no_stripe"][stm_post_details][vc_column_text css=".vc_custom_1487433116299{margin-bottom: 20px !important;}" el_class="no_stripe"] How to apply proper risk management methodology on information security? Risk in its negative way might be defined as one undesired consequence that may…

A Letter to the CISO; Talk about Business with your Board, not technicality.

Dear CISO and Board I think we should always consider our job as a part of the business. We finally started to consider cyber security and data protection as a serious issue but now the question is how we evaluate…

Detailed Threat Analysis of Shamoon 2.0 Malware

[vc_row css=".vc_custom_1452687555475{margin-bottom: 100px !important;}"][vc_column offset="vc_col-lg-9 vc_col-md-9" css=".vc_custom_1452702342137{padding-right: 45px !important;}"][vc_custom_heading source="post_title" use_theme_fonts="yes" el_class="no_stripe"][stm_post_details][vc_column_text css=".vc_custom_1486648453783{margin-bottom: 20px !important;}" el_class="no_stripe"] Our Previous post talked about the initial overview of the Shamoon 2.0 sample. This analysis is a continuation of our last post but with…

Machine learning in cybersecurity will boost big data, intelligence, and analytics spending

[vc_row css=".vc_custom_1452687555475{margin-bottom: 100px !important;}"][vc_column offset="vc_col-lg-9 vc_col-md-9" css=".vc_custom_1452702342137{padding-right: 45px !important;}"][vc_custom_heading source="post_title" use_theme_fonts="yes" el_class="no_stripe"][stm_post_details][vc_column_text css=".vc_custom_1486561173906{margin-bottom: 20px !important;}" el_class="no_stripe"] Cyber threats are an ever-present danger to global economies and are projected to surpass the trillion dollar mark in damages within the next year.…

Build a SOC or Choose an MSSP?

[vc_row][vc_column][vc_column_text] Introduction: The decision to build an internal Security Operations Center (SOC) versus selecting a Managed SecurityService Provider (MSSP) to handle operational information security concerns can be a difficult and time consuming task for organizations seeking to improve their security…

With IT Operations Analytics, Data Is Everything

[vc_row css=".vc_custom_1452687555475{margin-bottom: 100px !important;}"][vc_column offset="vc_col-lg-9 vc_col-md-9" css=".vc_custom_1452702342137{padding-right: 45px !important;}"][vc_custom_heading source="post_title" use_theme_fonts="yes" el_class="no_stripe"][stm_post_details][vc_column_text css=".vc_custom_1486556263695{margin-bottom: 20px !important;}" el_class="no_stripe"] DevOps. Machine learning. Faster decision making. The biggest trends in IT are helping us speed release cycles, get more insights, and improve operations like…

How Business Email Compromise Scams Can Hurt Your Business

[vc_row css=".vc_custom_1452687555475{margin-bottom: 100px !important;}"][vc_column offset="vc_col-lg-9 vc_col-md-9" css=".vc_custom_1452702342137{padding-right: 45px !important;}"][vc_custom_heading source="post_title" use_theme_fonts="yes" el_class="no_stripe"][stm_post_details][vc_column_text css=".vc_custom_1477607099871{margin-bottom: 20px !important;}" el_class="no_stripe"] Today’s digital frontier can be very much likened to the old days of the Wild West. In this present era identified by the ubiquitous…

The Business Risk of Cyber Threats to Ghana’s Banking & Financial Systems

[vc_row css=".vc_custom_1452687555475{margin-bottom: 100px !important;}"][vc_column offset="vc_col-lg-9 vc_col-md-9" css=".vc_custom_1452702342137{padding-right: 45px !important;}"][vc_custom_heading source="post_title" use_theme_fonts="yes" el_class="no_stripe"][stm_post_details][vc_column_text css=".vc_custom_1477606778975{margin-bottom: 20px !important;}" el_class="no_stripe"] The Cyber Security Threat Landscape Unless you have been living under a rock for the last few years you most certainly have been struck…