Introduction Today, the biggest gap in the cyber security of organizations is that companies work in isolation while criminals are…
Digital Transformation vs. Organisational Legacy The hybrid role of the CISO Beyond the functional distinctions we analysed in our reporting…
How to apply proper risk management methodology on information security? Risk in its negative way might be defined as one…
Dear CISO and Board I think we should always consider our job as a part of the business. We finally…
Our Previous post talked about the initial overview of the Shamoon 2.0 sample. This analysis is a continuation of our…
Cyber threats are an ever-present danger to global economies and are projected to surpass the trillion dollar mark in damages…
Introduction: The decision to build an internal Security Operations Center (SOC) versus selecting a Managed SecurityService Provider (MSSP) to handle…
DevOps. Machine learning. Faster decision making. The biggest trends in IT are helping us speed release cycles, get more insights,…
Today’s digital frontier can be very much likened to the old days of the Wild West. In this present era…
All rights reserved 2025