Search Results for: cybersecurity risks Blog Post Here are The Top Cybersecurity Risks in Cloud Computing March 10, 2021 In the past few years, the demand for cloud computing has increased dramatically. However, the transition to the cloud has... Blog Post What is Cyber Risk or Cybersecurity Risk? May 26, 2020 What is Cybersecurity Risk or Cyber Risk? Risk is commonly defined as threat times vulnerability times consequence. There are many... Blog Post Effective Project Management for Successful Cybersecurity Projects March 1, 2021 As per a survey by McKinsey & Co., executing project management techniques has enabled organizational teams to diminish Information Technology... Blog Post Incident Types and Taxonomies Used in Cybersec Community May 11, 2021 In the face of this complex and multi-faceted landscape of threat actors and IoCs, security experts can benefit greatly from... Blog Post Risk assessment according to NIST SP 800-30 March 3, 2021 The SP 800-30 Guide for Conducting a Risk Assessment is a guideline by the National Institute of Standards and Technology... Blog Post Shadow IT: The Risks, How it Gets Exploited, Its Mitigation Steps January 7, 2021 Shadow IT refers to the use of IT applications, software, and hardware without the corporate IT department’s approval and knowledge.... Blog Post Cybersecurity Compliance Laws in 2021 – Keeping Your Organization on the Right Side of the Law March 24, 2021 Cybersecurity and regulatory compliance are becoming increasingly entwined, especially regarding businesses for which consumer data is a key resource. Learning... Blog Post Security Recommendations February 25, 2022 Our thoughts are with everyone across Europe, and the world, during these distressing times. Here are some general recommendations for... Blog Post Boost MongoDB Security and Keep Hackers Away With These 10 Powerful Tips May 28, 2020 Multiple businesses across the globe use MongoDB for data storage projects. Though this database has some security configurations by default,... Blog Post The Overlooked Cyber Risk of Employees Returning to the Offices from Quarantine August 24, 2020 The COVID-19 pandemic has created many challenges for businesses. Employees have been tasked with working remotely from home, in addition... Blog Post Mitigating Cyber Risk June 5, 2020 Cyber risk is commonly defined as exposure to harm or loss resulting from breaches or attacks on information systems. Every... Blog Post CREST Incident Response Maturity Assessment March 16, 2021 CREST is an international not-for-profit accreditation and certification body that represents and supports the technical information security market. CREST’s mission... Blog Post The Inaugural Women & Diversity in Cybersecurity Leadership Forum February 15, 2020 Cyber Event in New York City, Powered by LIFARS. Register Here… An evolving Cybersecurity Risk Landscape and unique challenges facing... Blog Post Cyber Security Webinar On-Demand: Workforce Diaspora – Adapting to Secure the Remote Workforce June 1, 2020 Free cyber security webinar on demand powered by LIFARS and Darktrace: “Workforce Diaspora – Adapting to Secure the Remote Workforce”... Blog Post 73% of Employees Have No Cybersecurity Awareness May 24, 2020 According to a joint study conducted by Kaspersky Lab and B2B International, 73% of companies have experienced internal information security...
Blog Post Here are The Top Cybersecurity Risks in Cloud Computing March 10, 2021 In the past few years, the demand for cloud computing has increased dramatically. However, the transition to the cloud has...
Blog Post What is Cyber Risk or Cybersecurity Risk? May 26, 2020 What is Cybersecurity Risk or Cyber Risk? Risk is commonly defined as threat times vulnerability times consequence. There are many...
Blog Post Effective Project Management for Successful Cybersecurity Projects March 1, 2021 As per a survey by McKinsey & Co., executing project management techniques has enabled organizational teams to diminish Information Technology...
Blog Post Incident Types and Taxonomies Used in Cybersec Community May 11, 2021 In the face of this complex and multi-faceted landscape of threat actors and IoCs, security experts can benefit greatly from...
Blog Post Risk assessment according to NIST SP 800-30 March 3, 2021 The SP 800-30 Guide for Conducting a Risk Assessment is a guideline by the National Institute of Standards and Technology...
Blog Post Shadow IT: The Risks, How it Gets Exploited, Its Mitigation Steps January 7, 2021 Shadow IT refers to the use of IT applications, software, and hardware without the corporate IT department’s approval and knowledge....
Blog Post Cybersecurity Compliance Laws in 2021 – Keeping Your Organization on the Right Side of the Law March 24, 2021 Cybersecurity and regulatory compliance are becoming increasingly entwined, especially regarding businesses for which consumer data is a key resource. Learning...
Blog Post Security Recommendations February 25, 2022 Our thoughts are with everyone across Europe, and the world, during these distressing times. Here are some general recommendations for...
Blog Post Boost MongoDB Security and Keep Hackers Away With These 10 Powerful Tips May 28, 2020 Multiple businesses across the globe use MongoDB for data storage projects. Though this database has some security configurations by default,...
Blog Post The Overlooked Cyber Risk of Employees Returning to the Offices from Quarantine August 24, 2020 The COVID-19 pandemic has created many challenges for businesses. Employees have been tasked with working remotely from home, in addition...
Blog Post Mitigating Cyber Risk June 5, 2020 Cyber risk is commonly defined as exposure to harm or loss resulting from breaches or attacks on information systems. Every...
Blog Post CREST Incident Response Maturity Assessment March 16, 2021 CREST is an international not-for-profit accreditation and certification body that represents and supports the technical information security market. CREST’s mission...
Blog Post The Inaugural Women & Diversity in Cybersecurity Leadership Forum February 15, 2020 Cyber Event in New York City, Powered by LIFARS. Register Here… An evolving Cybersecurity Risk Landscape and unique challenges facing...
Blog Post Cyber Security Webinar On-Demand: Workforce Diaspora – Adapting to Secure the Remote Workforce June 1, 2020 Free cyber security webinar on demand powered by LIFARS and Darktrace: “Workforce Diaspora – Adapting to Secure the Remote Workforce”...
Blog Post 73% of Employees Have No Cybersecurity Awareness May 24, 2020 According to a joint study conducted by Kaspersky Lab and B2B International, 73% of companies have experienced internal information security...