Our Blog

 

Social Media Monitoring: A Cybersecurity Approach

Social Media Monitoring: A Cybersecurity Approach

Social Media Monitoring is used in cybersecurity to detect and prevent threats from social media or other social interaction channels like forums or chatrooms. This should not be confused with social media intelligence which sounds similar but is an entirely different method used in marketing to analyze the behavior trends of individuals from social networking sites.  What is Social Media Monitoring? Today's criminals have also learned about the power of social media. Information about a user...

read more
API – the neglected IT vulnerability?

API – the neglected IT vulnerability?

A couple of years ago, almost every IT system was a dedicated standalone solution with only one purpose . Calculating the best path for the first NASA moon mission or creating a digital weather forecast for the first time in history. All those systems did not  need to communicate to other IT systems  because they combined all required capabilities in themselves. Unlike today where every system from the smartphone in our pocket to the ERP Systems of the biggest internationally acting companies...

read more
Dark Web Monitoring

Dark Web Monitoring

The dark web is the part of the internet that is only accessible through a specialized web browser. It enables criminals and other users who require a high degree of anonymity to transact business and communicate with far less risk. Some use the dark web to evade government censorship, but it’s also a breeding ground for illegal activity. As more companies are targeted by data breaches, their data is often sold to the highest bidder on marketplaces or shared in forums. It is in the...

read more
The Three Lines of Defense model and its challenges

The Three Lines of Defense model and its challenges

In one of our latest blog post, we gave an overview of how the Three-Lines-of-Defense (3LoD) model can be used risk management (The Three Lines of Defense model). This post addresses the challenges of the model and how it can be improved. Criticism and Problems The organizational structure is changing to more agile and technology-driven solutions, which increase company efficiencies and complexities. Hence risk management frameworks need to keep up with the speed of this development. Often,...

read more
Information Security

Information Security

We live in the digital world, and information technology is an essential part of our health, happiness, and livfes and even has more importance for our business. For example, information security plays a significant role in medical equipment used in hospitals, banking transactions, traveling on the newest cars, security systems in the homes, smartphones, and smart devices in the current human experience every day. Therefore, with the rise of information technology, cyberattacks have also...

read more
The Three Lines of Defense model

The Three Lines of Defense model

As the risk of being targeted by cyberattacks is steadily increasing, prevention and defense against them are mandatory in every organization. The origin of the three lines of defense model as a concept to holistically manage risks lies in the financial sector and regulators and consultants often recommend it. Thus, many organizations in the financial industry around the globe started following this approach. The model aims at providing efficient and effective risk management, not just...

read more
How to perform efficient Threat Analysis and Risk Assessments

How to perform efficient Threat Analysis and Risk Assessments

Due to digitalization, the number of cyberattacks will inevitably increase worldwide, as the possible attack vectors that a potential hacker can exploit increase proportionally to the increasing connectivity of systems. The consequence of this is that the system needs for cybersecurity and data protection increases to protect from these threats. There is never a guarantee of preventing a threat in cybersecurity and data protection, but there is a clear goal to minimize cybersecurity risks....

read more
Digital Security & Privacy Marketing Strategy – Best Practices

Digital Security & Privacy Marketing Strategy – Best Practices

Due to the increasing awareness of cybersecurity and privacy matters in the consumer market, these topics are becoming more relevant. Companies like Apple make consumer data protection their selling point. Therefore, companies must advertise their digital security and privacy strategy to (possible) customers.  For this matter, we at Ginkgo Cybersecurity collected the best practices to improve the marketing strategy for digital security and privacy. Figure 1: A Security & Privacy Marketing...

read more
How Log Aggregation & Monitoring Solutions can improve Cybersecurity and close security gaps in an organization

How Log Aggregation & Monitoring Solutions can improve Cybersecurity and close security gaps in an organization

The explosive data growth in recent years causes companies to lose track of the information coming in and out of business. Businesses worldwide report that at least half of their company data is dark data, i.e., untapped, unused, or completely unknown. This situation leads to serious security gaps where companies can become victims of cyber-attacks. SIEM (Security Information and Event Management) can perform log aggregation & monitoring, such as the market leader in the field Splunk. The...

read more
How cyber-insurance and security architecture can safeguard an organization from cyber-attacks

How cyber-insurance and security architecture can safeguard an organization from cyber-attacks

In the age of digitization, more and more companies are falling victim to cyber-attacks. It estimates that two in every three companies were affected by cyber-attacks. Although, cyber-attacks have long since ceased to be the only target of large corporations, attackers are increasingly targeting small companies. This is precisely why cybersecurity has become extremely important in companies. In particular, securing privileged user accounts and critical systems are on the agenda of many...

read more

Want to get Secure?

Contact