Cybersecurity

A Log4j retrospective

It was reported that 2021 was a  record year for zero-day exploits, and to many it has felt like a non-stop string of resource- and risk-intensive vulnerabilities to remediate. The Log4j exploit seemed to get more attention than others because of its pervasiveness in organizations, regardless of size or industry. While many articles, blogs, and …

A Log4j retrospective Read More »

Why you should adapt the MITRE ATT&CK framework for threat intelligence

Cyber threat incidents continue to worsen with the adoption of remote technologies and the growing sophistication of attacks. Palo Alto Networks published a report in May 2021 indicating that attackers are getting faster at identifying and exploiting vulnerabilities immediately after they are published. The researchers observed that, between January and March 2021, adversaries began scanning …

Why you should adapt the MITRE ATT&CK framework for threat intelligence Read More »

Infosec leader evaluating various information security frameworks for his organization's needs.

Which information security framework is right for my business?

Choosing the appropriate information security framework for your organization is important in protecting confidential or sensitive data, systems, and overall cyber resilience. With increasing regulatory requirements and an ever-evolving threat landscape, it is vital to devise a structured approach for safeguarding your assets and effectively managing your cyber risks. The right information security framework provides …

Which information security framework is right for my business? Read More »

Navigating digital transformation & cybersecurity

The digital transformation wave is here, we’re in the middle of it, and cybersecurity needs to adapt matching the urgency, pace, and the delivery of new or improved digital products. Businesses are transforming across industries, focused on improving the quality and engagement of customer-facing products. cybersecurity needs to be a pressing concern that is ultimately …

Navigating digital transformation & cybersecurity Read More »

Two cybersecurity professionals engaged in a conversation, discussing ways to mitigate IoT risks.

How to mitigate IoT risks using Zero Trust concept

  Sean Rosenberger wrote this article in 2017. The title was, “InfoSec and the Great IoT gold rush”. Ever since we have seen the Internet of Things revolutionize how we interact with technology and connect everyday devices and systems to the Internet. All in a bid to make our lives more convenient and efficient. However, …

How to mitigate IoT risks using Zero Trust concept Read More »

Image showing a hand holding a key, symbolizing access management in the CA Identity Manager: IAM product review.

CA Identity Manager: IAM product review

UPDATED: Our team has updated this article since it was originally published in 2015, and IAM tools have come a long way since that time. We’d like to hear about your experience with CA Identity Manager, as well as other IAM tools. How does it stack up, in your experience? Contact us and let us …

CA Identity Manager: IAM product review Read More »

Image of an employee working on big data analytics.

How to tackle big data cybersecurity concerns

As technology advances and the amount of data we generate increases exponentially, we cannot overstate the significance of big data across different sectors and industries. You know, the real driving force behind big data is all about quantifying information. It’s pretty interesting how things have changed. Back then, you’d go for a morning jog without …

How to tackle big data cybersecurity concerns Read More »

Employee using a fintech app with infosec measures

The ultimate guide to unlock fintech’s infosec

Information security, infrastructure, and technology play pivotal roles in the ever-evolving landscape of financial technology (fintech). As the fintech industry continues to disrupt traditional financial systems, it brings transformative opportunities and challenges. While technological advancements have revolutionised how we handle finances, they have also exposed vulnerabilities that can have far-reaching consequences. This article explores the …

The ultimate guide to unlock fintech’s infosec Read More »

Two IT professionals are discussing the most in-demand IT jobs in 2023.

The 10 most in-demand Security and IT jobs of 2023

The technology industry is constantly evolving, and with it, the demand for skilled IT professionals with expertise in various areas such as cybersecurity, cloud computing, and artificial intelligence. According to a report published by The Bureau of Labor Statistics, the increasing sophistication of cyberattacks and the need for every organization to secure its critical data …

The 10 most in-demand Security and IT jobs of 2023 Read More »

Employee working on a personal computer

5 Ways to Secure Your BYOD Devices

BYOD started trending around the time we first published this article. Still, the pandemic and adopting the work-from-home model have made the BYOD model necessary for small businesses and larger corporations. Discussions around Bring Your Own Device(BYOD) remain hot in the infosec sector. There are also concerns for companies who want to prioritize the cybersecurity …

5 Ways to Secure Your BYOD Devices Read More »