Offensive Security Certified Professional: What threats are others facing in your sector?

Offensive security, ethical hacking, endpoint detection response, network security, system audit, computer forensic amongst others, equipped with – one hopes – all the skills and cunning of their adversaries, the ethical hacker is legally permitted to exploit security networks and improve systems by fixing vulnerabilities found during the testing, subsequently, Read more…

Cyber Threat Hunting: What are the most serious cyber risks to critical infrastructure?

The increasing digitization of corporate assets, proliferation of network connectivity, disappearance of corporate borders, and the increasing motivation and capabilities of cyber adversaries have transformed cyber risk from a technical consideration for a single organization into a significant business risk for the whole enterprise, armed with akin passwords, especially those Read more…

Cyber Threat Hunting: Are all your Data Privacy policies updated on a regular basis and how do you check that some are effective?

The advanced and evolving nature of cyber threats means that all businesses, even those with the best preventive security controls in place, are susceptible to data breaches, an effective cyber security program uses tools like data loss prevention, endpoint security, strong firewalls, security analytics, and multi-factor authentication, threat modelling should Read more…