Latest news & articles

Build a SOC or Choose an MSSP?

Introduction: The decision to build an internal Security Operations Center (SOC) versus selecting a Managed SecurityService Provider (MSSP) to handle…

By February 2017

With IT Operations Analytics, Data Is Everything

DevOps. Machine learning. Faster decision making. The biggest trends in IT are helping us speed release cycles, get more insights,…

By February 2017

How Business Email Compromise Scams Can Hurt Your Business

Today’s digital frontier can be very much likened to the old days of the Wild West. In this present era…

By October 2016

The Business Risk of Cyber Threats to Ghana’s Banking & Financial Systems

The Cyber Security Threat Landscape Unless you have been living under a rock for the last few years you most…

By October 2016

Future SOC

Are you waiting for something bad, or going somewhere good? A CEO asked me that once. It is one of…

By August 2016

These CISOs explain why they got fired

Today’s Chief Information Security Officer (CISO) leads an increasingly precarious life.Since the emergence of the job title in the late…

By August 2016

Threat Intelligence Starter Resources

Creating a threat intelligence capability can be a challenging undertaking, and not all companies are ready for it. Businesses that…

By August 2016

The life of a social engineer: Hacking the human

A clean-cut guy with rimmed glasses and a warm smile, Jayson E. Street looks nothing like the stereotypical hacker regularly…

By August 2016

The Cyber Kill Chain or: how I learned to stop worrying and love data breaches

Pulling off a heist is no easy feat – and in order to prevent theft, you best understand the plan…

By July 2016