Blog

Blog

Cybersecurity Framework – Protect – part 1

Cybersecurity Framework in OT The NIST Cybersecurity Framework (CSF) has been widely adopted by various organizations in both the public and private sectors. It serves as a guide for conducting cybersecurity activities and addressing cybersecurity risks. This...
Security Operations Centre – part 1

Security Operations Centre – part 1

What is a Security Operations Centre (SOC)? As with many concepts, there isn’t one single definition as to what a Security Operations Centre (SOC) is. According to the SANS Institute, SOC is a combination of people, processes and technologies securing an...

read more
Zero Trust Architecture

Zero Trust Architecture

For many years the infrastructure security model was based on securing the perimeter of the environment. Defenses were built at the perimeter of the network to prevent malicious actors from getting inside. However, once an attacker broke through the...

read more
Data Privacy, Data Security, Vol. III

Data Privacy, Data Security, Vol. III

Browser hardening There are many layers at which you can improve your security and privacy. Apart from the layer of the operating system and its settings, the layer of applications, the next important layer is the browser used. Browsers are a window into the...

read more
Data Privacy, Data Security, Vol. III

Data Privacy, Data Security, Vol. III

Privacy & Security improvement tips for Windows users (and many others) 1. Password Use a strong password, something easy to remember but difficult to hack. There are a few good concepts around such as to use three random words or a passphrase – such as...

read more
Data Privacy, Data Security, Vol. II

Data Privacy, Data Security, Vol. II

Data Security Data security is all the things you do and solutions you implement to protect digital information from unauthorised access, corruption, or theft throughout its entire lifecycle. I am sure the reader is well aware of the various basic data...

read more

About our blog

As a team of highly experienced professionals, we aim to share our knowledge and expertise in a variety of subjects related to cybersecurity. Our goal is to help solve problems, but most importantly, we intend to assist our readers in securing themselves against cyber threats.