-
How Simulation Training is becoming an Integral part of Cyber Preparedness. (Recorded Webinar)
- June 13, 2020
- Posted by: Edem Glymin
- Category: Information Security, Intelligence
No CommentsDefining and testing a cyber incident response plan is a highly effective way of reducing the impact and duration of a real cyber incident. Detect and respond to cyber incidents in line with your organisation’s response plan, based on simulated attacks that use similar technologies to those deployed in real attack scenarios. These simulation exercises
-
COVID-19 | The Cybersecurity Effect of the Pandemic
- April 24, 2020
- Posted by: Edem Glymin
- Category: Information Security
By: Edem Glymin, Lead security and risk consultant for Global Secure Solutions Ghana Limited. How did we get here? Suddenly the world as we knew it came to a grinding halt and tottered on the brink of despair. In a swift moment our sanity became questioned, our livelihoods and freedom of movement threatened by an
-
Vietnam-linked hackers targeted Chinese government over coronavirus response: researchers
- April 24, 2020
- Posted by: Edem Glymin
- Category: Data Security, Information Security
By: Jack Stubbs, Raphael Satter Additional reporting by Muyu Xu in Beijing and James Pearson in Hanoi; Editing by Richard Chang Source: Reuters LONDON/WASHINGTON (Reuters) – Hackers working in support of the Vietnamese government have attempted to break into Chinese state organisations at the centre of Beijing’s effort to contain the coronavirus outbreak, U.S. cybersecurity
-
U.S. Charges 4 Chinese Military Officers in 2017 Equifax Hack
- April 9, 2020
- Posted by: Edem Glymin
- Category: Data Security, Information Security, Intelligence
Source: krebsonsecurity The U.S. Justice Department today unsealed indictments against four Chinese officers of the People’s Liberation Army (PLA) accused of perpetrating the 2017 hack against consumer credit bureau Equifax that led to the theft of personal data on nearly 150 million Americans. DOJ officials said the four men were responsible for carrying out the
-
Zero-day attacks: Protections, best practices and how to implement them
- April 9, 2020
- Posted by: Edem Glymin
- Category: Information Security, Risk Management, Threat Intelligence
Sources: InfosecInstitute Zero-day (0day) exploit, Imperva Cybersecurity: How to get your software patching strategy right and keep the hackers at bay, ZDNet Five Key Capabilities To Look for in a Managed Web Application Firewall (WAF) Provider, GBHackers on Security Introduction Zero-day attacks are one of the most dangerous cybersecurity threats. This type of
-
Department of Justice goes after scammers exploiting Coronavirus pandemic
- April 9, 2020
- Posted by: Edem Glymin
- Category: Information Security
-
What is a Cyber Threat? How to Explain Cyber Threats to Your CEO
- February 19, 2017
- Posted by: Edem Glymin
- Category: Information Security, Risk Management
What is a Cyber Threat? How to Explain Cyber Threats to Your CEO February 19, 2017 Posted by: Edem Glymin Category: Information Security, Risk Management No Comments How to explain cyber threats to your CEO and others. Learn more about the potential for risk What is a cyber threat? To explain what a cyber threat -
Database Architecture And Security
- February 18, 2017
- Posted by: Edem Glymin
- Category: Data Security, Information Security
Database Architecture And Security February 18, 2017 Posted by: Edem Glymin Category: Data Security, Information Security No Comments Security Architecture An essential but often missing element in an information security program is a well-defined and complete information security architecture that reflects the business decisions and the information security policy decisions of the organization. In -
The role of the CISO, the CIO and the Board
- February 18, 2017
- Posted by: Edem Glymin
- Category: Information Security, Leadership Insights
The role of the CISO, the CIO and the Board February 18, 2017 Posted by: Edem Glymin Category: Information Security, Leadership Insights No Comments Digital Transformation vs. Organisational Legacy The hybrid role of the CISO Beyond the functional distinctions we analysed in our reporting line article (CISO as a Figurehead / CISO as a -
Build a SOC or Choose an MSSP?
- February 8, 2017
- Posted by: Edem Glymin
- Category: Information Security
Introduction: The decision to build an internal Security Operations Center (SOC) versus selecting a Managed SecurityService Provider (MSSP) to handle operational information security concerns can be a difficult and time consuming task for organizations seeking to improve their security posture. This post will explore advantages and disadvantages of both options and provide context around my
- 1
- 2
Contact Global Secure Solutions by completing our online feedback form.