How Simulation Training is becoming an Integral part of Cyber Preparedness. (Recorded Webinar)

https://player.vimeo.com/video/428224232 Defining and testing a cyber incident response plan is a highly effective way of reducing the impact and duration of a real cyber incident. Detect and respond to cyber incidents in line with your organisation's response plan, based on…

COVID-19 | The Cybersecurity Effect of the Pandemic

By: Edem Glymin, Lead security and risk consultant for Global Secure Solutions Ghana Limited. How did we get here? Suddenly the world as we knew it came to a grinding halt and tottered on the brink of despair. In a…

Vietnam-linked hackers targeted Chinese government over coronavirus response: researchers

By: Jack Stubbs, Raphael Satter Additional reporting by Muyu Xu in Beijing and James Pearson in Hanoi; Editing by Richard Chang  Source: Reuters LONDON/WASHINGTON (Reuters) - Hackers working in support of the Vietnamese government have attempted to break into Chinese…

U.S. Charges 4 Chinese Military Officers in 2017 Equifax Hack

Source: krebsonsecurity The U.S. Justice Department today unsealed indictments against four Chinese officers of the People’s Liberation Army (PLA) accused of perpetrating the 2017 hack against consumer credit bureau Equifax that led to the theft of personal data on nearly…

Zero-day attacks: Protections, best practices and how to implement them

Sources: InfosecInstitute Zero-day (0day) exploit, Imperva Cybersecurity: How to get your software patching strategy right and keep the hackers at bay, ZDNet Five Key Capabilities To Look for in a Managed Web Application Firewall (WAF) Provider, GBHackers on Security  …

What is a Cyber Threat? How to Explain Cyber Threats to Your CEO

[vc_row css=".vc_custom_1452687555475{margin-bottom: 100px !important;}"][vc_column offset="vc_col-lg-9 vc_col-md-9" css=".vc_custom_1452702342137{padding-right: 45px !important;}"][vc_custom_heading source="post_title" use_theme_fonts="yes" el_class="no_stripe"][stm_post_details][vc_column_text css=".vc_custom_1487469006060{margin-bottom: 20px !important;}" el_class="no_stripe"] How to explain cyber threats to your CEO and others. Learn more about the potential for risk What is a cyber threat? To explain…

Database Architecture And Security

[vc_row css=".vc_custom_1452687555475{margin-bottom: 100px !important;}"][vc_column offset="vc_col-lg-9 vc_col-md-9" css=".vc_custom_1452702342137{padding-right: 45px !important;}"][vc_custom_heading source="post_title" use_theme_fonts="yes" el_class="no_stripe"][stm_post_details][vc_column_text css=".vc_custom_1487449120331{margin-bottom: 20px !important;}" el_class="no_stripe"]   Security Architecture An essential but often missing element in an information security program is a well-defined and complete information security architecture that reflects…

The role of the CISO, the CIO and the Board

[vc_row css=".vc_custom_1452687555475{margin-bottom: 100px !important;}"][vc_column offset="vc_col-lg-9 vc_col-md-9" css=".vc_custom_1452702342137{padding-right: 45px !important;}"][vc_custom_heading source="post_title" use_theme_fonts="yes" el_class="no_stripe"][stm_post_details][vc_column_text css=".vc_custom_1487434916179{margin-bottom: 20px !important;}" el_class="no_stripe"]   Digital Transformation vs. Organisational Legacy The hybrid role of the CISO Beyond the functional distinctions we analysed in our reporting line article (CISO…

Build a SOC or Choose an MSSP?

[vc_row][vc_column][vc_column_text] Introduction: The decision to build an internal Security Operations Center (SOC) versus selecting a Managed SecurityService Provider (MSSP) to handle operational information security concerns can be a difficult and time consuming task for organizations seeking to improve their security…