Cyber Security Blog

2 10, 2018

Happy CyberSecurity Month!

By | October 2nd, 2018|Conference, Cyber Security|0 Comments

CyberSecurity Month. This October, National Cybersecurity Awareness Month, is the time to focus raising awareness about the importance of cybersecurity. Cyber Security in 2018: The Transition It’s been a year of transition for cybersecurity professionals and attackers alike. As noted by Forbes, cybersecurity spending in the U.S. could reach $66 billion by the end of 2018. Globally, that [...]

19 08, 2018

CIOs are at the corner of innovation and security, but is security their job?

By | August 19th, 2018|Cyber Security|0 Comments

In this day and age digital disruption is an ever-present occurrence in almost every sector, and it is this fact that earned some CIOs the title of Chief Innovation Officer’s. But with a massive focus on innovation some areas in business tend to suffer, and amongst the worst hit is security. “We can’t speak on [...]

3 10, 2017

Insider fraud in the banking industry: What if we could help you prevent, detect and respond to insider fraud?

By | October 3rd, 2017|Conference|0 Comments

An insider threat is a malicious hacker (also called a cracker or a black hat) who is an employee or officer of a business, institution, or agency. The term can also apply to an outside person who poses as an employee or officer by obtaining false credentials. The hacker obtains access to the computer systems [...]

6 09, 2017

Can Better IT Prevent the Spread of Ransomware?

By | September 6th, 2017|Conference|0 Comments

Is it possible that ransomware attacks are exacerbated in part by failures in corporate IT? Some of these failures are so grave they borderline “negligence”. It is just a matter of time before global organizations are liable for the disruption caused by outbreak of ransomware such as WannaCry and /NotPetya. These ramsonware use an exploit [...]

30 08, 2017

The Next Big Attack Landscape: Eye on SCADA

By | August 30th, 2017|Conference|0 Comments

This white paper explores the continuously expanding cyber-attack landscape through a profound analysis of the SCADA (Supervisory Control and Data Acquisition) Systems/ICS, their functionalities as well as the need to protect such systems from cyber-attacks to help safeguard the critical infrastructures