Focus on external security is not enough. Cyber Security must assume that the infrastructure is already penetrated.

Focus on external security is not enough.

Focus on external security is not enough. Cyber Security must assume that the infrastructure is already penetrated. It is not uncommon that cybercriminals penetrate information infrastructure without actually weaponizing their access immediately. Advanced Persistent Threats (APT) very gradually increase their access and focus on staying undetected. Post Mortem analyzes after APT attacks show that it

Focus on external security is not enough. Read More »

Cyber Security requires a big picture approach in an era where digital transformation is a success enabler. Those who can balance this will win the markets.

Cyber Security requires a big picture approach in an era where digital transformation is a success enabler.

Cyber Security requires a big picture approach in an era where digital transformation is a success enabler. Those who can balance this will win the markets. Digital Transformation creates an unforeseen challenge for many organizations. How can we generate a change management culture that happily embraces changes and at the same time maintain rigid controls

Cyber Security requires a big picture approach in an era where digital transformation is a success enabler. Read More »

The key is not to prioritize what's on your schedule, but to schedule your priorities.

The key is not to prioritize what’s on your schedule, but to schedule your priorities.

The key is not to prioritize what’s on your schedule, but to schedule your priorities. – Stephen Covey, Author and Speaker We have all been in situation where our schedule is so full that all we can do is take it heads on and work our way through. For some of us that is in

The key is not to prioritize what’s on your schedule, but to schedule your priorities. Read More »

Threats and risks continue to change, so should your actions.

Threats and risks continue to change, so should your actions.

Threats and risks continue to change, so should your actions. There isn’t field in which threats evolve as fast as in cybersecurity. Besides a constantly growing number of new threats, there is also the challenge that existing threats keep mutating and get more advanced. In addition to modifying the ways of distribution and attacks, these

Threats and risks continue to change, so should your actions. Read More »

Solve today’s challenges before they become tomorrow’s problems.

Solve today’s challenges before they become tomorrow’s problems.

Solve today’s challenges before they become tomorrow’s problems. Many motivational coaches will tell us that there is no such things as problems. In their line of thoughts, there are only challenges and it all depends on our attitude about those challenges. Although it will sound overly simplified for someone who is facing real problems on

Solve today’s challenges before they become tomorrow’s problems. Read More »