JD

The largest risk in Cyber Security is a false sense of safety. The largest threat in Cyber Security are those who create a false sense of safety.

The largest threat in Cyber Security are those who create a false sense of safety.

The largest risk in Cyber Security is a false sense of safety. The largest threat in Cyber Security are those who create a false sense of safety. There are a lot of false narrative related to cybersecurity, and unless you are having the required digital skills to evaluate them all, it can be quite challenging […]

The largest threat in Cyber Security are those who create a false sense of safety. Read More »

Using systems beyond End-of-Life is a significant cyber risk.

Using systems beyond End-of-Life is a significant cyber risk.

Using systems beyond End-of-Life is a significant cyber risk. Almost everyone who has been or is in a role with responsibility for IT has been in a situation where devices or operating systems had reached their end-of-life, but there were logical explanations why it would make sense to keep using them. Other priorities, budget restrictions,

Using systems beyond End-of-Life is a significant cyber risk. Read More »

People who say you can do everything you want when you want it enough haven’t dealt with real problems.

People who say you can do everything you want when you want it enough haven’t dealt with real problems.

People who say you can do everything you want when you want it enough haven’t dealt with real problems. It is easy to say that you can achieve anything you want when you want it enough, but it is also far from realistic. There are many situations where the circumstances are stacked against whatever it

People who say you can do everything you want when you want it enough haven’t dealt with real problems. Read More »

Not patching critical vulnerabilities is an open invitation to exploit them. Cyber criminals will accept that invitation!

Not patching critical vulnerabilities is an open invitation to exploit them. Cyber criminals will accept that invitation!

Not patching critical vulnerabilities is an open invitation to exploit them. Cyber criminals will accept that invitation! Our study The Human Element in Cybersecurity shows that abandoned technology is by far the largest root cause of cybersecurity incidents. And a significant part of abandoned technology is unpatched vulnerabilities. Vulnerabilities in applications, firmware, operating systems, drivers,

Not patching critical vulnerabilities is an open invitation to exploit them. Cyber criminals will accept that invitation! Read More »

After being celebrated as a technical skill for many years, Cyber Security is finally getting recognized as a crucial soft-skill. It is time we develop that soft-skill!

After being celebrated as a technical skill for many years, Cyber Security is finally getting recognized as a crucial soft-skill.

After being celebrated as a technical skill for many years, Cyber Security is finally getting recognized as a crucial soft-skill. It is time we develop that soft-skill! For many years the focus of cybersecurity initiatives has mainly been on technology, which is of course important but does not cover the entire bandwidth of challenges and

After being celebrated as a technical skill for many years, Cyber Security is finally getting recognized as a crucial soft-skill. Read More »