[vc_row css=".vc_custom_1452687555475{margin-bottom: 100px !important;}"][vc_column offset="vc_col-lg-9 vc_col-md-9" css=".vc_custom_1452702342137{padding-right: 45px !important;}"][vc_custom_heading source="post_title" use_theme_fonts="yes" el_class="no_stripe"][stm_post_details][vc_column_text css=".vc_custom_1487450619835{margin-bottom: 20px !important;}" el_class="no_stripe"] The purpose of the…
[vc_row css=".vc_custom_1452687555475{margin-bottom: 100px !important;}"][vc_column offset="vc_col-lg-9 vc_col-md-9" css=".vc_custom_1452702342137{padding-right: 45px !important;}"][vc_custom_heading source="post_title" use_theme_fonts="yes" el_class="no_stripe"][stm_post_details][vc_column_text css=".vc_custom_1487449721337{margin-bottom: 20px !important;}" el_class="no_stripe"] In my previous role…
Security Architecture An essential but often missing element in an information security program is a well-defined and complete information security…
Introduction Today, the biggest gap in the cyber security of organizations is that companies work in isolation while criminals are…
Digital Transformation vs. Organisational Legacy The hybrid role of the CISO Beyond the functional distinctions we analysed in our reporting…
How to apply proper risk management methodology on information security? Risk in its negative way might be defined as one…
Dear CISO and Board I think we should always consider our job as a part of the business. We finally…
Our Previous post talked about the initial overview of the Shamoon 2.0 sample. This analysis is a continuation of our…
Cyber threats are an ever-present danger to global economies and are projected to surpass the trillion dollar mark in damages…
All rights reserved 2023