Search for content, post, videos

Tag

Cybersecurity

0 COMMENT
1434 Views
Risk Management & Information Security

It is incorrect to presume that only large organizations need to manage risk. The size of the organization is not a factor when it comes to dealing with risk; all organizations are responsible for ensuring the availability, integrity, and confidentiality of the assets entrusted to them by their clients. Therefore,…

cybersecurity-practices-data
0 COMMENT
1001 Views
The Use of National Cybersecurity Practices for Building Proper Cybersecurity Management Programs | The Case of Estonia

Estonia is known as a pioneer in building e-country solutions. Some examples are e-government solutions, e-identity, e-voting, etc. My intention is to add to this list cybersecurity-related solutions, based on the fact that Estonia holds the number one position on the National Cyber Security Index (NCSI) ranking. I am not…

Marriott-cyber-attack-breach-security
0 COMMENT
1221 Views
Marriott’s’ 500 Million Data Breach Scandal

A politically inclined attack or just a ‘simple’ lack of security awareness? Whatever the case, the cyber-attack that hit Marriott was huge. This was the joint second largest data breach to take place, after Yahoo in 2013 and Equifax in 2017. A cyber attacker stole personal information including names, emails,…

catch-wave-jobs-of-the-future
0 COMMENT
1661 Views
Catch the Wave: What are the Jobs of the Future?

We are all talking about the future of jobs. But the question that we should perhaps ask, the most essential one, is: How should those jobs look like (or what should those jobs be)? With the evolution of the nature of the job market, we are facing new realities and…

cybersecurity-safe-online-attacks-threats
0 COMMENT
1290 Views
Make it a Habit! 10 Ways to Keep You Safe Online

It takes 20 years to build a reputation and few minutes of cyber-incident to ruin it. – Stéphane Nappo Global CISO at Société Générale International Banking 2017 has reminded us once again that security threats are getting more sophisticated, unexpected, and attackers are working harder to discover new vulnerabilities. From…