Journal

Information security – Protecting Security Data from Security People
Talking of modern security tools that scan millions of devices every day and gather intelligence on billions of events, these

What is Cybersecurity Leadership?
What is Cybersecurity Leadership? For organizations today, cyber risk is everywhere. Nevertheless, for every investment they have done to secure

How can you be Fluent in Cyber Risk?
How Can You Be Fluent in Cyber Risk? Do you know that 91% of businesses say their boards believe that

Is your Firewall Measuring up?
A robust firewall is the first line of defense in keeping an Organization safe from advanced cybersecurity threats. But in

Cyber Risks Heating Up for Businesses with International Tensions Flaring
Cyber Risks Heating Up for Businesses with International Tensions Flaring You might be aware that security issues have been moving

Everything about ISO 27001:2013 and ISO 27001:2017
All That You Need To Know About ISO 27001:2013 and ISO 27001:2017 ISO 27001:2013 is one of the most popular

Ensuring Compliance with the new GDPR
Ensuring Compliance With New General Data Protection Regulations General Data Protection Regulation (GDPR) is the EU’s new data protection legislation

Why are IT Managers Struggling to cope with Cyberattacks?
Why Are IT Managers Struggling To Cope With Cyberattacks? According to the latest research, last year, 2/3rd of organisations were

6 Security Areas under Target during Covid-19 Pandemic.
6 Security Areas Under Target During Covid-19 Pandemic. Stay Vigilant Covid-19 pandemic has left many Organisations and individuals to embrace

Why Cybersecurity matters the most during the Coronavirus Pandemic?
Why Cybersecurity Matters the Most During the Coronavirus Pandemic? The emergence of Information Technology as an ubiquitous aspect of our

Protecting yourself from Cyberattacks while working from home.
Protecting Yourself from CyberAttacks While Working From Home During Covid-19 Pandemic With Coronavirus Pandemic affecting our lives, more and more

General Data Protection Regulation – Complying with GDPR Requirements
General Data Protection Regulation – Complying With GDPR Requirements In 2018, the General Data Protection Regulation (GDPR) replaced the Data