
Blog

SVB Bank Failure: The Top Cybersecurity Measures for CISOs and Security Leaders
The recent failure of SVB bank and emerging cybersecurity threats highlight the importance of having robust security measures in place to protect sensitive data and prevent cyber attacks. Here are some top pieces of advice for security leaders and CISOs in light of this event.

Proactive Cybersecurity: Because a Mb of Proactive Prevention is Worth a Gb of Reactive Remediation
As a security practitioner, understanding the importance of proactive cybersecurity is crucial to protecting your organization from evolving cyber threats. Learn more about what proactive cybersecurity is, why you need it, and how to implement it.

Expectations Meet Reality: The Case for Cybersecurity Performance Management
Learn more about Cybersecurity Performance Management (CPM) and how it can help CISOs and security leaders measure the performance and improvement of their cybersecurity program over time.

ChatGPT Enables Millions of Potential Cyber Attackers
While ChatGPT has captured the imagination of many and sparked discussions about the future role of humans in an increasingly automated world, it has also raised significant concerns about its possible impact on the field of cybersecurity.

Piracy in the Digital Age: Ransomware and Ransomware as a Service
History is rife with tales of pirates prowling the high seas and bandits lying in wait along highways, searching for goods to hijack or persons to kidnap.

Expanded Horizons: The Benefits of XDR
Networks experience a constant stream of activity from all connected devices. Keeping track of the goings-on across smaller networks poses a challenge for security teams, with this problem only magnifying as the network expands.

The Purview of a CISO
Many industries function very much like a ship, be it a sailing ship of old or a modern spacecraft voyaging among the stars. Each person aboard the vessel has a different role to serve based on their unique skill set to contribute to the fulfillment of the mission.

Essential Steps for a more effective Phishing Mitigation Plan
As the Russia-Ukraine conflict continues to rage on, the attack surface has expanded beyond physical borders and into the cyber arena.

5 Tips to Maximize Your SIEM/SOAR Capabilities
While cybersecurity demands a lot of human input, there is only so much that the security teams can handle on their own.

Lapsus$ – All you need to know!
Last week, the cybersecurity industry was shaken when Microsoft and Okta were breached by the Lapsus$ group.

Cybersecurity Strategy – Start from the Basics
Cybersecurity is a constantly evolving industry. New threats can emerge at any time and without warning, as with zero-day exploits.

Russia-Ukraine War / Cybersecurity Challenges and Recommendations
Russia’s recent invasion of Ukraine has left the geopolitical arena in a spiral. While there has been constant fighting on the ground, fewer assaults across cyberspace have occurred than expected. Russia has a history of cyberwarfare, and given the unpredictability of the conflict, attacks in the virtual sphere have become one of the main fronts.