Tag "Cyber Security Guidelines"

Back to homepage
Industry Insights

Cybersecurity in the “When-Not-If” Era

Historically, cybersecurity has been seen as an equation between risk appetite, compliance requirements and costs. The “When-Not-If” paradigm brings certainty where they used to be doubts; there will be cyber

Industry Insights

How can we give cybersecurity analysts a helping hand?

It’s tough being a cybersecurity analyst these days. Over the last few years we have been repeatedly reminded of the challenge they are now facing, primarily through the steady stream

Identity Theft

Before Blaming Hackers, Check Your Configurations

Improving configuration management in Software-as-a-Service (SaaS) applications can minimize the risk of data loss, phishing campaigns and prevent breaches. How can the IT team put up guardrails for users? Click

Industry Insights

What CISOs should focus on when deciding on a strategy

The effectiveness of an organization’s security strategy and implementation can sometimes be difficult to assess. Michael Hamilton, President and CISO of CI Security, says looking at a number of key

Industry Insights

Cyber Security Roundup for April 2019

The UK government controversially gave a green light to Huawei get involved with the building of the UK’s 5G networks, although the Chinese tech giant role will be limited to non-sensitive areas of the network,

Industry Insights

Privacy Is Too Big to Understand

This article is part of a limited-run newsletter. You can sign up here. There’s a passage from a recent book by the journalist David Wallace-Wells about writing on the sprawling topic of climate


New Phishing scam called ‘The Hotlist’ now targets the Instagram users

The new scam operates in a similar manner as the recent ‘The Nasty List’ scam. The scam begins with Instagram users receiving a message regarding a list of their ‘hot’

Industry Insights

GoT Guide to Cybersecurity: Preparing for Battle During a Staffing Shortage

Faced with an overwhelming adversary, Game of Thrones heroes Daenerys Targaryen and Jon Snow have a lot in common with today’s beleaguered CISOs. Strong similarities exist between the precarious plight

Identity Theft

Dark Web Fraudsters Defraud Each Other with Fraud Guides

Cyber-criminals are doing a roaring trade in “how-to” fraud guides for their fellow scammers, although many are out-of-date and incomplete, according to new dark web research from Terbium Labs. The cyber-intelligence

Industry Insights

Why Every Leadership Meeting Should Include a Cybersecurity Update

As part of our “C-Suite Accountability” theme, we explore why holding senior executives accountable is a necessary motivator in the prioritization, development, and adoption of cybersecurity initiatives across the small