Cyber Risk

Spot the Fed: Mastodon, the Fediverse, and why you can’t run servers like it’s 1999

Decentralized technology has become an increasing topic of interest to technologists and enthusiasts seeking alternatives to the “walled garden” of many online communities and platforms. Spinning up a web service has become much easier with DevOps tooling, automation, and cloud services. However, the internet is more complex a place than it was twenty years ago. […]

Spot the Fed: Mastodon, the Fediverse, and why you can’t run servers like it’s 1999 Read More »

Cybersecurity digest: Ransomware, social engineering, and MFA negligence

The following article on recent cybersecurity news and events was written by Kalles Group Security Consultant, Jayanth Kumar. This content appears in our monthly email Security Digest, which unpacks recent security incidents and details what you should know, and what you should do.   Ransomware Resurgence: A Ticking Time Bomb   What you need to

Cybersecurity digest: Ransomware, social engineering, and MFA negligence Read More »

Why you should adapt the MITRE ATT&CK framework for threat intelligence

Cyber threats are becoming more severe with the widespread use of remote technologies and the increasing sophistication of attacks. Recent analyses indicate that attackers are exploiting vulnerabilities at unprecedented speeds. In 2023, the average time to exploit a vulnerability after public disclosure decreased to just five days, a significant reduction from 32 days in 2022.

Why you should adapt the MITRE ATT&CK framework for threat intelligence Read More »

Which information security framework is right for my business?

Which information security framework is right for my business?

Which Information Security Framework is Right for My Business? Picking the right security framework is important to protect your organization’s sensitive information and systems. With so many threats and regulations to think about, it’s important to have a plan in place to reduce risks and meet compliance requirements. A security framework provides step-by-step guidelines to

Which information security framework is right for my business? Read More »

Discover the intersection of artificial intelligence and cyber security. Explore risks, opportunities, and strategies for safeguarding your organization.

How to secure digital transformation initiatives

Securing digital transformation is paramount in today’s fast-paced technological landscape. As organizations embark on digitalization journeys, they open new doors to efficiency, agility, and innovation. However, this transformation also unveils an array of cybersecurity challenges. This article will dive deep into the critical intersection of digital transformation and cybersecurity. We’ll explore how businesses can navigate

How to secure digital transformation initiatives Read More »

Security Success: Navigating the Threat Landscape

In this ever-dynamic technology landscape, data drives business success, and cybersecurity has never been more critical. Small and mid-sized businesses (SMBs) are not immune to the ever-evolving threat landscape, making it imperative to be well-informed and proactive in protecting their digital assets. Recently, our team hosted an interactive webinar featuring Glen Wills, Kalles Group’s Practice

Security Success: Navigating the Threat Landscape Read More »

How to mitigate IoT risks using Zero Trust concept

  Sean Rosenberger wrote this article in 2017. The title was, “InfoSec and the Great IoT gold rush”. Ever since we have seen the Internet of Things revolutionize how we interact with technology and connect everyday devices and systems to the Internet. All in a bid to make our lives more convenient and efficient. However,

How to mitigate IoT risks using Zero Trust concept Read More »

Discover the intersection of artificial intelligence and cyber security. Explore risks, opportunities, and strategies for safeguarding your organization.

Can artificial intelligence win the war in cyberspace?

Ensuring that artificial intelligence (AI) is ‘secure by design’ and established on solid foundations poses a significant challenge in the cybersecurity space. As AI becomes increasingly pervasive across various technological domains and is integrated into critical systems, the imperative of ensuring secure design and deployment becomes paramount. Neglecting this aspect can potentially expose individuals and

Can artificial intelligence win the war in cyberspace? Read More »

CA Identity Manager: IAM product review

UPDATED: Our team has updated this article since it was originally published in 2015, and IAM tools have come a long way since that time. We’d like to hear about your experience with CA Identity Manager, as well as other IAM tools. How does it stack up, in your experience? Contact us and let us

CA Identity Manager: IAM product review Read More »

5 big data cybersecurity concerns of 2023

As technology advances and the amount of data we generate increases exponentially, we cannot overstate the significance of big data across different sectors and industries. You know, the real driving force behind big data is all about quantifying information. It’s pretty interesting how things have changed. Back then, you’d go for a morning jog without

5 big data cybersecurity concerns of 2023 Read More »

The ultimate guide to unlock fintech’s infosec

Information security, infrastructure, and technology play pivotal roles in the ever-evolving landscape of financial technology (fintech). As the fintech industry continues to disrupt traditional financial systems, it brings transformative opportunities and challenges. While technological advancements have revolutionised how we handle finances, they have also exposed vulnerabilities that can have far-reaching consequences. This article explores the

The ultimate guide to unlock fintech’s infosec Read More »

Your future is secured when your business can use, maintain, and improve its technology

Request a free consultation