Procordr

I was invited by Rob from Procordr to see an early demonstration of their cybersecurity platform, and I must say I was impressed. It certainly would give me as a CISO the required information that all CISO have been struggling to obtain into a single pane of glass. Procordr is […]

Read more
DevOps

How to implement security in DevOps

DevOps is a set of methods that incorporates software development and IT operative processes all the while aiming to shorten the systems development cycle giving out continuous delivery with high software quality. It has brought a cultural change in business by transforming the way operations, developers, and testers cohesively collaborate […]

Read more

WHY YOU NEED A GOOD SECURITY GOVERNANCE?

What is security governance? Security governance is the mechanism by which an organization integrates with Information technology and controls, monitors, and directs the Information security. It ensures that accountability in the organization exists. The strategies adopted are in coordination with the business objectives and rules and regulations. Governance of security’s […]

Read more
Malware

How Secure Are Your Home Workers?

Introduction The reality of today’s workplace has turned grim, in response to the current COVID-19 epidemic. Several companies across the world have rolled out work-from-home strategies. As a result, there has been a massive influx of employees that are working remotely, connecting to their respective corporate networks and employing cloud-based […]

Read more

Getting The (Security) Message Across to The Board

Introduction In any organization or business, security breaches can occur at any number of points in the operational-cycle, where personal detail or information is shared. There is no denying the fact that, security threats can be posed by cybercriminals, or employees, or even systems. It is hardly a surprise that […]

Read more

Why Security Is Needed In A Downturn?

Introduction There is no denying the fact that these are challenging times for the people in charge of information security. They are not only coping with the rising advanced threats to corporate data and network but in many situations, they are struggling to figure out solutions on tiny budgets and […]

Read more