Define sensitive data and how to protect it

How to define sensitive data and the means of protecting it 

What is sensitive data, how do you define it and how to protect it A report revealed that in ...
Read More
Breaking down new SEC rules on cybersecurity risk management

Breaking down new SEC rules on cybersecurity risk management

What are the new SEC rules on cybersecurity risk management disclosure? The Securities and Exchange Commission (SEC) has introduced new ...
Read More
Top 3 Ransomware Examples and what can we learn from them

Top 3 Ransomware Examples and what can we learn from them

Ransomware attacks have become a significant threat to businesses worldwide. As organisations adopt remote working models to accommodate WFH, they expose ...
Read More
Understanding the cyber risks of the LDAP protocol

Understanding the cyber risks of the LDAP protocol

The Lightweight Directory Access Protocol (LDAP protocol) is an open, vendor-neutral, industry-standard application protocol for accessing and maintaining distributed directory ...
Read More
How to protect personally identifiable information

How to protect personally identifiable information from a cyber breach 

In recent years, personally identifiable information (PII) such as social security numbers, medical history, and banking details have become a ...
Read More
Cyber ecosystem - your Supply chain attack protection

How a cyber ecosystem works – your protection against a supply chain attack

A cyber ecosystem is very much like a physical ecosystem. Within a cyber ecosystem, individuals, organisations, and external parties interact with ...
Read More
Why you should conduct a cyber security Posture Assessment

Why a Cyber Security Posture Assessment is a must?

Why you should assess you cyber security posture? To figure out whether you need a security posture assessment, let's first ...
Read More
How to use NIST SP 800-61 guide for third-party risk?

How to use NIST SP 800-61 guide to be better prepared for third-party risk

As your business grows, so does its third-party ecosystem. But with growth comes a greater sense of responsibility which entails ...
Read More
Network vendor risk assessment

New vendor risk assessment with SIG questionnaire in 2022

The Standard Information Gathering (SIG) questionnaire is a configurable tool to enable the scoping of a diverse vendor risk assessment using ...
Read More