Our Blog

 

Security Policies – What exactly are they?

Security Policies – What exactly are they?

For most organizations, maintaining security is an integral part of day-to-day business. Many organizations would fail if their security was seriously compromised.  To reduce the likelihood of security failures, the security implementation process has been formalized to some extent through a hierarchical organization of documentation. Each level focuses on a specific type or category of information and matter. To lay the foundation of a robust and reliable security infrastructure security...

read more
Zero Trust – trust no one?

Zero Trust – trust no one?

It seems like Zero Trust technology is the silver bullet to solve all security challenges in a corporate network. But what exactly is Zero Trust, why should it be used, and how does it protect the assets? First, Zero Trust is not technology at all. John Kindervag coined the term in 2010 when he described a way to optimize security architectures by getting away from the purely perimeter-based defense model. The perimeter-based model builds layered defenses - like multiple firewalls - around the...

read more
Secure the modern workplace!

Secure the modern workplace!

Why now? Working from home was once considered a luxury. It became a necessity, with individuals all around the world being quarantined due to the coronavirus. This is a game-changer not only for workers in the world's wealthiest countries (where the largest companies with the most lucrative positions tend to locate), but also for worldwide employment and, as a result, amplifying the social mobility in poorer countries. The additional freedom acquired by remote work revolutionizes the work...

read more
Social Media Monitoring: A Cybersecurity Approach

Social Media Monitoring: A Cybersecurity Approach

Social Media Monitoring is used in cybersecurity to detect and prevent threats from social media or other social interaction channels like forums or chatrooms. This should not be confused with social media intelligence which sounds similar but is an entirely different method used in marketing to analyze the behavior trends of individuals from social networking sites.  What is Social Media Monitoring? Today's criminals have also learned about the power of social media. Information about a user...

read more
API – the neglected IT vulnerability?

API – the neglected IT vulnerability?

A couple of years ago, almost every IT system was a dedicated standalone solution with only one purpose . Calculating the best path for the first NASA moon mission or creating a digital weather forecast for the first time in history. All those systems did not  need to communicate to other IT systems  because they combined all required capabilities in themselves. Unlike today where every system from the smartphone in our pocket to the ERP Systems of the biggest internationally acting companies...

read more
Dark Web Monitoring

Dark Web Monitoring

The dark web is the part of the internet that is only accessible through a specialized web browser. It enables criminals and other users who require a high degree of anonymity to transact business and communicate with far less risk. Some use the dark web to evade government censorship, but it’s also a breeding ground for illegal activity. As more companies are targeted by data breaches, their data is often sold to the highest bidder on marketplaces or shared in forums. It is in the...

read more
The Three Lines of Defense model and its challenges

The Three Lines of Defense model and its challenges

In one of our latest blog post, we gave an overview of how the Three-Lines-of-Defense (3LoD) model can be used risk management (The Three Lines of Defense model). This post addresses the challenges of the model and how it can be improved. Criticism and Problems The organizational structure is changing to more agile and technology-driven solutions, which increase company efficiencies and complexities. Hence risk management frameworks need to keep up with the speed of this development. Often,...

read more
Information Security

Information Security

We live in the digital world, and information technology is an essential part of our health, happiness, and livfes and even has more importance for our business. For example, information security plays a significant role in medical equipment used in hospitals, banking transactions, traveling on the newest cars, security systems in the homes, smartphones, and smart devices in the current human experience every day. Therefore, with the rise of information technology, cyberattacks have also...

read more
The Three Lines of Defense model

The Three Lines of Defense model

As the risk of being targeted by cyberattacks is steadily increasing, prevention and defense against them are mandatory in every organization. The origin of the three lines of defense model as a concept to holistically manage risks lies in the financial sector and regulators and consultants often recommend it. Thus, many organizations in the financial industry around the globe started following this approach. The model aims at providing efficient and effective risk management, not just...

read more
How to perform efficient Threat Analysis and Risk Assessments

How to perform efficient Threat Analysis and Risk Assessments

Due to digitalization, the number of cyberattacks will inevitably increase worldwide, as the possible attack vectors that a potential hacker can exploit increase proportionally to the increasing connectivity of systems. The consequence of this is that the system needs for cybersecurity and data protection increases to protect from these threats. There is never a guarantee of preventing a threat in cybersecurity and data protection, but there is a clear goal to minimize cybersecurity risks....

read more

Want to get Secure?

Contact