Whether it means analyzing vulnerabilities, performing malware analysis, or even attempting to gather information on a target for threat intelligence, the lifestyle of an information security expert is a very tedious task to take on in the world of cybersecurity, especially when helping to improve the security of a certain…
Governance, Risk Management, and Compliance (GRC) policies have become crucial components of organizational strategy and operations across the globe. The rapid advancement of technology, increasing globalization, and heightened awareness of data privacy and security have significantly influenced the evolution of these policies. This evolution is further driven by introducing and…
As a Cybersecurity Consultant and Practice Leader, I often encounter clients’ inquiries regarding the most effective approach for implementing or complying with an ISO standard, particularly in security. My response highlights the simplicity and efficacy of the Plan-Do-Check-Act (PDCA) model, a framework universally applied across various ISO standards to foster…
Evaluation frameworks for Large Language Models (LLMs) are systematic approaches to assessing the performance, capabilities, and limitations of these models. The growth in size and capability of the LLMs and the rise of powerful Small Language Models (SLMs) have reinforced the need for robust evaluation frameworks to ensure their reliability,…
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity In an era where digital transformation is inevitable, the cybersecurity landscape is constantly evolving. This article delves into key topics discussed in our recent webinar, including the Digital Operational Resilience Act (DORA) and its implications, the ISO/IEC…
Modern-day security breaches like the SolarWinds or T-Mobile attacks are not one-off events; they are prime examples of how someone can steal your organization’s credentials and use them to gain illegitimate privileged access to sensitive assets. Data breaches happen daily, and in too many places at once to keep count.…
Artificial Intelligence (AI) is rapidly transforming how we interact with digital technologies, pushing the boundaries of what machines can do and how they can learn. As AI continues to evolve, it increasingly becomes a double-edged sword: on one side, it drives innovation and efficiency, and on the other, it introduces…
In today’s landscape, operational resilience is crucial, especially for financial services reliant on information and communication technology (ICT). The Digital Operational Resilience Act (DORA) aims to fortify this resilience by setting regulatory requirements for financial institutions and their ICT suppliers. DORA is more than just a regulation—it is a shift…
Movies have accustomed us to envision unethical hackers as highly antisocial individuals, often with some type of complex, either due to lack of ego or an excess of it, who live lives filled with thrills, type 100 words per minute, never use a mouse, only have a black wallpaper, and…
The world is full of colour and energy. Human ingenuity has harnessed this vibrancy to build truly amazing things. It is also this ingenuity that drives us to perpetually innovate and create, shaping the future we will all inhabit. But for us to make progress on challenges – from renewable…