5 Proven Steps to Building a Security Awareness Program

How does one undertake an effective end-user security awareness program? How can security awareness be measured? Are there regulatory requirements for some verticals regarding ...
Read More

How to Make Your Cyber Security Projects Succeed

Most of us have been there. There’s a big cyber security project underway, and it isn’t going well. You sit down and try to reason out how it got to this state. Back in the ...
Read More

Extracting the Best Value From Your SIEM tools

Security Information and Events Management (SIEM) tools manage, correlate, and analyze thousands of data and security events. In an environment of increasing vulnerabilities, ...
Read More

10 Managed Security Services Benefits To Know

Managed Security Services or outsourced security services are becoming a new reality for businesses of all sizes. Hiring an MSSP offers more than a few advantages to an ...
Read More

4 Tips for Defining PCI Scope for Your Environment

One of the biggest challenges for companies that must follow the PCI DSS standard is to properly map the PCI scope of systems and environments that should stick to the hundreds ...
Read More

The Three Key Domains of the GDPR Explained

There are three keys areas organisations should know about concerning the EU GDPR legislation. GDPR focuses on the core areas of data governance, data management, and data ...
Read More

The 16 Sectors of Critical Infrastructure Cybersecurity

Globally, we live in a digital landscape full of cyber threats and vulnerabilities. We are headed to a future where both public and private sector security professionals must ...
Read More

The Most Spine-Chilling Cyber Security Threats This Halloween

CAUTION! The spooky charmers we are about to review are not for the faint of heart. This year has been a doozy when it comes to the brood of cybersecurity threats that were ...
Read More