Cyber Risk

Why you should adapt the MITRE ATT&CK framework for threat intelligence

Cyber threat incidents continue to worsen with the adoption of remote technologies and the growing sophistication of attacks. Palo Alto Networks published a report in May 2021 indicating that attackers are getting faster at identifying and exploiting vulnerabilities immediately after they are published. The researchers observed that, between January and March 2021, adversaries began scanning …

Why you should adapt the MITRE ATT&CK framework for threat intelligence Read More »

Infosec leader evaluating various information security frameworks for his organization's needs.

Which information security framework is right for my business?

Choosing the appropriate information security framework for your organization is important in protecting confidential or sensitive data, systems, and overall cyber resilience. With increasing regulatory requirements and an ever-evolving threat landscape, it is vital to devise a structured approach for safeguarding your assets and effectively managing your cyber risks. The right information security framework provides …

Which information security framework is right for my business? Read More »

decentralizing the security of digital transformation and industry 4.0

How to secure digital transformation initiatives

Securing digital transformation is paramount in today’s fast-paced technological landscape. As organizations embark on digitalization journeys, they open new doors to efficiency, agility, and innovation. However, this transformation also unveils an array of cybersecurity challenges. This article will dive deep into the critical intersection of digital transformation and cybersecurity. We’ll explore how businesses can navigate …

How to secure digital transformation initiatives Read More »

Two cybersecurity professionals engaged in a conversation, discussing ways to mitigate IoT risks.

How to mitigate IoT risks using Zero Trust concept

  Sean Rosenberger wrote this article in 2017. The title was, “InfoSec and the Great IoT gold rush”. Ever since we have seen the Internet of Things revolutionize how we interact with technology and connect everyday devices and systems to the Internet. All in a bid to make our lives more convenient and efficient. However, …

How to mitigate IoT risks using Zero Trust concept Read More »

Image showing a hand holding a key, symbolizing access management in the CA Identity Manager: IAM product review.

CA Identity Manager: IAM product review

UPDATED: Our team has updated this article since it was originally published in 2015, and IAM tools have come a long way since that time. We’d like to hear about your experience with CA Identity Manager, as well as other IAM tools. How does it stack up, in your experience? Contact us and let us …

CA Identity Manager: IAM product review Read More »

big data cybersecurity-Image of an employee working on big data analytics.

5 big data cybersecurity concerns of 2023

As technology advances and the amount of data we generate increases exponentially, we cannot overstate the significance of big data across different sectors and industries. You know, the real driving force behind big data is all about quantifying information. It’s pretty interesting how things have changed. Back then, you’d go for a morning jog without …

5 big data cybersecurity concerns of 2023 Read More »

Employee using a fintech app with infosec measures

The ultimate guide to unlock fintech’s infosec

Information security, infrastructure, and technology play pivotal roles in the ever-evolving landscape of financial technology (fintech). As the fintech industry continues to disrupt traditional financial systems, it brings transformative opportunities and challenges. While technological advancements have revolutionised how we handle finances, they have also exposed vulnerabilities that can have far-reaching consequences. This article explores the …

The ultimate guide to unlock fintech’s infosec Read More »

Employee working on a personal computer

5 Ways to Secure Your BYOD Devices

BYOD started trending around the time we first published this article. Still, the pandemic and adopting the work-from-home model have made the BYOD model necessary for small businesses and larger corporations. Discussions around Bring Your Own Device(BYOD) remain hot in the infosec sector. There are also concerns for companies who want to prioritize the cybersecurity …

5 Ways to Secure Your BYOD Devices Read More »