Our Blog
Social Media Monitoring: A Cybersecurity Approach
Social Media Monitoring is used in cybersecurity to detect and prevent threats from social media or other social interaction channels like forums or chatrooms. This should not be confused with social media intelligence which sounds similar but is an entirely different method used in marketing to analyze the behavior trends of individuals from social networking sites. What is Social Media Monitoring? Today's criminals have also learned about the power of social media. Information about a user...
API – the neglected IT vulnerability?
A couple of years ago, almost every IT system was a dedicated standalone solution with only one purpose . Calculating the best path for the first NASA moon mission or creating a digital weather forecast for the first time in history. All those systems did not need to communicate to other IT systems because they combined all required capabilities in themselves. Unlike today where every system from the smartphone in our pocket to the ERP Systems of the biggest internationally acting companies...
Dark Web Monitoring
The dark web is the part of the internet that is only accessible through a specialized web browser. It enables criminals and other users who require a high degree of anonymity to transact business and communicate with far less risk. Some use the dark web to evade government censorship, but it’s also a breeding ground for illegal activity. As more companies are targeted by data breaches, their data is often sold to the highest bidder on marketplaces or shared in forums. It is in the...
The Three Lines of Defense model and its challenges
In one of our latest blog post, we gave an overview of how the Three-Lines-of-Defense (3LoD) model can be used risk management (The Three Lines of Defense model). This post addresses the challenges of the model and how it can be improved. Criticism and Problems The organizational structure is changing to more agile and technology-driven solutions, which increase company efficiencies and complexities. Hence risk management frameworks need to keep up with the speed of this development. Often,...
Information Security
We live in the digital world, and information technology is an essential part of our health, happiness, and livfes and even has more importance for our business. For example, information security plays a significant role in medical equipment used in hospitals, banking transactions, traveling on the newest cars, security systems in the homes, smartphones, and smart devices in the current human experience every day. Therefore, with the rise of information technology, cyberattacks have also...
The Three Lines of Defense model
As the risk of being targeted by cyberattacks is steadily increasing, prevention and defense against them are mandatory in every organization. The origin of the three lines of defense model as a concept to holistically manage risks lies in the financial sector and regulators and consultants often recommend it. Thus, many organizations in the financial industry around the globe started following this approach. The model aims at providing efficient and effective risk management, not just...
How to perform efficient Threat Analysis and Risk Assessments
Due to digitalization, the number of cyberattacks will inevitably increase worldwide, as the possible attack vectors that a potential hacker can exploit increase proportionally to the increasing connectivity of systems. The consequence of this is that the system needs for cybersecurity and data protection increases to protect from these threats. There is never a guarantee of preventing a threat in cybersecurity and data protection, but there is a clear goal to minimize cybersecurity risks....
Digital Security & Privacy Marketing Strategy – Best Practices
Due to the increasing awareness of cybersecurity and privacy matters in the consumer market, these topics are becoming more relevant. Companies like Apple make consumer data protection their selling point. Therefore, companies must advertise their digital security and privacy strategy to (possible) customers. For this matter, we at Ginkgo Cybersecurity collected the best practices to improve the marketing strategy for digital security and privacy. Figure 1: A Security & Privacy Marketing...
How Log Aggregation & Monitoring Solutions can improve Cybersecurity and close security gaps in an organization
The explosive data growth in recent years causes companies to lose track of the information coming in and out of business. Businesses worldwide report that at least half of their company data is dark data, i.e., untapped, unused, or completely unknown. This situation leads to serious security gaps where companies can become victims of cyber-attacks. SIEM (Security Information and Event Management) can perform log aggregation & monitoring, such as the market leader in the field Splunk. The...
How cyber-insurance and security architecture can safeguard an organization from cyber-attacks
In the age of digitization, more and more companies are falling victim to cyber-attacks. It estimates that two in every three companies were affected by cyber-attacks. Although, cyber-attacks have long since ceased to be the only target of large corporations, attackers are increasingly targeting small companies. This is precisely why cybersecurity has become extremely important in companies. In particular, securing privileged user accounts and critical systems are on the agenda of many...
Want to get Secure?
Contact