Latest news & articles

Vulnerability And Patch Management

[vc_row css=".vc_custom_1452687555475{margin-bottom: 100px !important;}"][vc_column offset="vc_col-lg-9 vc_col-md-9" css=".vc_custom_1452702342137{padding-right: 45px !important;}"][vc_custom_heading source="post_title" use_theme_fonts="yes" el_class="no_stripe"][stm_post_details][vc_column_text css=".vc_custom_1487450619835{margin-bottom: 20px !important;}" el_class="no_stripe"] The purpose of the…

By February 2017

3 Essential Components to Build into Your Incident Response Program in 2017

[vc_row css=".vc_custom_1452687555475{margin-bottom: 100px !important;}"][vc_column offset="vc_col-lg-9 vc_col-md-9" css=".vc_custom_1452702342137{padding-right: 45px !important;}"][vc_custom_heading source="post_title" use_theme_fonts="yes" el_class="no_stripe"][stm_post_details][vc_column_text css=".vc_custom_1487449721337{margin-bottom: 20px !important;}" el_class="no_stripe"] In my previous role…

By February 2017

Database Architecture And Security

Security Architecture An essential but often missing element in an information security program is a well-defined and complete information security…

By February 2017

Threat Intelligence: Zero to One

Introduction Today, the biggest gap in the cyber security of organizations is that companies work in isolation while criminals are…

By February 2017

The role of the CISO, the CIO and the Board

Digital Transformation vs. Organisational Legacy The hybrid role of the CISO Beyond the functional distinctions we analysed in our reporting…

By February 2017

How to Apply Proper Risk Management Methodology on Information Security?

How to apply proper risk management methodology on information security? Risk in its negative way might be defined as one…

By February 2017

A Letter to the CISO; Talk about Business with your Board, not technicality.

Dear CISO and Board I think we should always consider our job as a part of the business. We finally…

By February 2017

Detailed Threat Analysis of Shamoon 2.0 Malware

Our Previous post talked about the initial overview of the Shamoon 2.0 sample. This analysis is a continuation of our…

By February 2017

Machine learning in cybersecurity will boost big data, intelligence, and analytics spending

Cyber threats are an ever-present danger to global economies and are projected to surpass the trillion dollar mark in damages…

By February 2017