Global Secure Solutions
  • Home
  • About GSS
  • Services
    • Consulting and Advisory Services
    • Examination Certification and Training Services
    • Professional Security Services
    • Technology Partner Services
  • Products
  • Blog
  • Contact Us
Global Secure Solutions
  • Home
  • About GSS
  • Services
    • Consulting and Advisory Services
    • Examination Certification and Training Services
    • Professional Security Services
    • Technology Partner Services
  • Products
  • Blog
  • Contact Us
  • The Cyber Kill Chain or: how I learned to stop worrying and love data breaches

    • July 22, 2016
    • Posted by: GSS Ghana
    • Category: Data Security, Information Security
    No Comments
    The Cyber Kill Chain or: how I learned to stop worrying and love data breaches July 22, 2016 Posted by: GSS Ghana Category: Data Security, Information Security No Comments Pulling off a heist is no easy feat – and in order to prevent theft, you best understand the plan of attack. Like any good ol’
    read more
  • The Pyramid of Pain

    • July 22, 2016
    • Posted by: GSS Ghana
    • Category: Risk Management
    No Comments
    The Pyramid of Pain July 22, 2016 Posted by: GSS Ghana Category: Risk Management No Comments To illustrate this concept, I have created what I like to call the Pyramid of Pain.  This simple diagram shows the relationship between the types of indicators you might use to detect an adversary's activities and how much pain it will
    read more
  • The Information Security Leader, Part 1: Two Distinct Roles, Four Fundamental Questions and Three Persistent Challenges

    • July 22, 2016
    • Posted by: GSS Ghana
    • Category: Information Security
    No Comments
    The Information Security Leader, Part 1: Two Distinct Roles, Four Fundamental Questions and Three Persistent Challenges July 22, 2016 Posted by: GSS Ghana Category: Information Security No Comments “If you always do what you’ve always done, you’ll always get what you’ve always got.” This kernel of wisdom comes from a certain high-tech headhunter in the
    read more
  • The Security Cost of Free Smartphone Apps

    • July 6, 2016
    • Posted by: GSS Ghana
    • Category: Information Security, Risk Management
    No Comments
    The Security Cost of Free Smartphone Apps July 6, 2016 Posted by: GSS Ghana Category: Information Security, Risk Management No Comments There are hundreds of thousands of them to choose from now whether you have an iPhone, an Android or some other version of smartphone. Free mobile applications sound like a great bargain, but be
    read more
  • Russian Threat Group Targets Clinton Campaign

    • June 16, 2016
    • Posted by: GSS Ghana
    • Category: CTU Research
    No Comments
    Russian Threat Group Targets Clinton Campaign June 16, 2016 Posted by: GSS Ghana Category: CTU Research No Comments Governments like to know what the leaders of rival countries are really thinking. To answer these questions, they may turn to their spy agencies, tasking them with obtaining information on policy and strategy that other countries would
    read more
  • Best Practices for Confidence in the Cloud

    • June 13, 2016
    • Posted by: GSS Ghana
    • Category: Cloud Security
    No Comments
    Best Practices for Confidence in the Cloud June 13, 2016 Posted by: GSS Ghana Category: Cloud Security No Comments Until recently, most cloud migration decisions were made without the benefit of the CISO's guidance. In an effort to take advantage of cloud efficiencies, line-of-business users have moved critical assets and confidential data to the cloud
    read more
  • Malware Lingers with BITS

    • June 6, 2016
    • Posted by: GSS Ghana
    • Category: CTU Research
    No Comments
    Malware Lingers with BITS June 6, 2016 Posted by: GSS Ghana Category: CTU Research No Comments Threat actors leveraged a “notification” feature in the Windows Background Intelligent Transfer Service (BITS) to download malware. In May 2016, the SecureWorks® Incident Response (IR) Team conducted an engagement involving a malware compromise. Antivirus software had previously detected and
    read more
  • 1
  • 2
  • 3
  • 4
Categories
  • Business Analytics
  • Cloud Security
  • CTU Research
  • Data Security
  • Incident Response
  • Information Security
  • Intelligence
  • Leadership Insights
  • Machine Learning
  • Malware
  • Risk Management
  • Threat Intelligence
  • Uncategorized
have any questions?

Contact Global Secure Solutions by completing our online feedback form.

feedback form
Company Profile
Global Secure Solutions

Phone : (+233) 243 335 025
Email : info@globalsecuresolutions.com
Location : 2nd Norla Street, North Labone
Address : P. O. Box CT 7001, Cantonments.

Twitter Feed

  • RT @darktracer_int: Lazarus, a North Korean hacker group, used servers on the darkweb as C2 server that command and control malware. https:…2 days ago
  • RT @threatintel: CISA updates guidance on Microsoft Exchange attacks, ID’s two more web shells https://t.co/zi2WXpki4m14 days ago
Copyright © 2021 Global Secure Solutions