Insider threats: what are they and how to prevent them?
There are different online threats that companies face every day. The most common one is phishing attacks where the victim accidentally clicks on an insecure link and logs in. Ot...
IoT security: risks and solutions
Internet of Things (IoT) is a term used to describe a system of interconnected computing devices that use the Internet to send and receive data without requiring person-to-device o...
Ransomware attack in the energy and utilities sector
The exponential growth of IoT devices in the energy and utilities industry has significantly increased the focus on cybersecurity. In this context, the energy and utilities secto...
Metrics that matter: a guide to improving safety reporting
Metrics are vital for security leaders to track the progress of security programs and have effective, risk-focused conversations with business and operational stakeholders. But do ...
What is data loss prevention?
The threat landscape is an ever-changing one as the number of cyber attacks continues to increase, data exfiltration now accounts for 70% of ransomware attacks and insiders are r...
What is Cyber Threat Intelligence and how to implement it?
Threat intelligence is data that is collected, processed and analyzed to understand the motives, objectives and attack behaviors of a threat actor. Is data that is co...
What is a virtual CISO (vCISO) and when is it advisable to hire their services?
Today, security is a critical concern for organizations in almost every industry due to its complexity and rapid evolution. Threats and vulnerabilities to information protection ...
IoT security analysis: Are your IoT devices secure?
The world of IoT encompasses a wide variety of technologies, vendors and connectivity methods. Although the first things that come to mind when we think of this new technology ar...