Mimic: The ransomware exploiting Windows search
Discover an emerging ransomware family that’s using a legitimate Windows search tool to locate victims’ files before encrypting them.
Read MoreWhat is the hot topic of the year in the current cyber landscape?
Zero-trust architecture.
What are some of the biggest threats, that are not being talked about enough?
Boosting cybersecurity through AI.
How do you react to constantly changing threats in the market?
Strategic planning, and Tactical Planning - Those two helps organizing the change management and keeping people engaged.
How do you quantify risk?
I’m a fan of mixing both quantitative & qualitative methods, purely quantifying risks may add unnecessary complexity.
What are some of your favorite "new" technologies or tools
Network Detection and Response (NDR), and Encrypted Traffic Analysis (ETA)
What are some of the key components to succeeding as a CISO in today’s business environment?
Learn, read, stay hungry for information.
What are the three things that you as CISO look at first to assess an organization’s cybersecurity readiness?
Understanding Your business, developing a strategic and tactical plan, Governance for your initiative to walk the talk.
If you had a time machine, what advice would you give yourself at the beginning of your career in cyber?
Invest more time in professional certification.
Join the newsletter to receive the latest updates in your inbox.
Discover an emerging ransomware family that’s using a legitimate Windows search tool to locate victims’ files before encrypting them.
Read MoreWhat are non-human identities (NHIs) and why are they driving a paradigm shift in identity security?
Read MoreNew research shows that a growing number of organisations view cybersecurity as a strategic priority.
Read More