Topic of the Month

Data Protection and Data Privacy

  1. Introduction “Privacy is not an option, and it shouldn’t be the price we accept for just getting on the Internet.

Read More
Cyber Insurance: is it indispensable or unnecessary?

  1. Introduction “Security leaders are under a lot of pressure to show quick wins while knowing full well that everything they do will be heavily scrutinized and challenged, and ultimately, they will pay the price for things that are not under their control.

Read More
Cyber Exercises: Practice makes perfect…in cybersecurity, too!

  1. Introduction “The five most efficient cyber defenders are: Anticipation, Education, Detection, Reaction and Resilience.

Read More
Encryption: the unnoticed law enforcement force in cyberspace

  1. Introduction “We still need encryption, and with the challenges we face on cybersecurity, encryption remains even more essential to protecting safety and commerce online.

Read More
Safer User Authentication & Password Hygiene

  1. Introduction “If I wanted to see your e-mails or your wife’s phone, all I have to do is use intercepts.

Read More
Mobile Devices & Bring Your Own Device

  1. Introduction “The only constant in the technology industry is change.

Read More