Intelligent Security & Compliance questions for top management to check their exposure! Let's ask the right questions Managing cybersecurity and compliance can be done in many different ways, and all depends on the size and complexity of your company. There are many great cybersecurity f...
Employee lifecycle management for security professionals Why you need an employee lifecycle In today's modern workplace the average yearly employee turnover rate is between 12% and 15%. With the new standard where people are able to work remotely and sudden...
How to do asset identification & management How to identify and categorise your assets If you don't know exactly what you are trying to protect, where it lives and why it is important to the company, then you are probably doing it wrong. This i...
Vulnerability management Vulnerability Identification Similar to the quote "When you don't know what you're aiming at, you'll always miss", for security I like to say "You're least vulnerable when you know where you're most v...
Toolkit for successful Security & Compliance Consultants Sharpen your knife They say you should spend most of your time sharpening your knife, before you go into combat. The same is true for security or compliance professionals that want to be successful. T...
Advance your career by becoming an independent information security consultant Cyber threats, including malware, phishing, and ransomware, are among the most severe threats to businesses today. For example, Google has found 100,000 malicious websites and 10,000 malicious files d...