The best incident handling plan is one that can be formalized. It means that the plan has been reviewed and approved by the concerned authority, shared on media, circulated and... Read More
“Data is the new oil.” It has been over a decade since Clive Humby, a data science pioneer and the co-founder of global customer data science company, Dunnhumby, said this.... Read More
Penetration testing is a vital component of a Threat Management Solution and is now used widely as an effective method of detecting vulnerabilities in an organization’s systems, applications, and infrastructures.... Read More
Recent years have seen the re-emergence of a type of threat that many of us in the cyber-security industry had hoped was a thing of the past. DNS hijacking attacks... Read More
Penetration testing is a vital component of a Threat Management Solution and is now used widely as an effective method of detecting vulnerabilities in an organization’s systems, applications, and infrastructures.... Read More
We are in an age of massive disruptions caused by the technology advancements of organizations going the extra mile to keep up with technology. Many organizations are in possession of... Read More
In December of 2017, Bitcoin hit $19,343 and was creating a feeding frenzy worldwide. The frenzy was far and wide and impacting even the most mature of social investment groups.... Read More
Even the most educated CEOs and CFOs often view the IT Department as a cost center. The concept of security being a cyclical process can be a foreign concept to... Read More
Now that we are a few days away from the GDPR being enforced, many are waking up to the full realization that they need to be compliant is an urgent... Read More
Cloud computing is everywhere. As McKinsey accurately predicted back in 2016, “in the next three years, enterprises will make a fundamental shift from building IT to consuming IT.” Today, most... Read More
On September 20, 2016, security blogger Brian Krebs, was hit with “an extremely large and unusually distributed denial-of-service (DDoS) attack designed to knock the site offline”. According to Krebs, “The... Read More