A pen test can help organizations identify vulnerabilities in their systems and software before threat actors have a chance to exploit them. Source – Security Intelligence: Why, When and How Often Should You Pen Test? By Warren Perez Araya co-authored by Elias Carbaguiaz Article Sharing Sponsored by: AISecureME AISecureMe Featured Service: Penetration Testing Services Web ApplicationsContinue reading “Why, When and How Often Should You Pen Test?”
Companies generally have two options for incident response and digital forensics: Buy or build? Explore the fundamentals of both options, which could help you decide. Source: Incident Response and Digital Forensics: Will You Buy or Build?
Source: Institute for Digital Transformation Author: Jessica Carroll One… Two… Three… …And then you’re gone. We consumers will wait about 3 seconds for a webpage to load and if it takes longer, we’ll abandon it and move on. We are impatient multi-taskers, and with so many digital options whether it’s websites, applications or social mediaContinue reading “We Consumers are Fickle, But Security is No Whim”
An Urgent Geopolitical and Humanitarian Initiative to Thwart China’s Predictive Policing of Minorities by N. MacDonnell Ulsch, Principal MacDonnell Ulsch Cyber Advisory LLC The People’s Republic of China vows to lead the world in Artificial Intelligence (AI). This initiative by the United States’ leading economic and military adversary has many alarming implications. While AI enhancesContinue reading “China: Tapping into Private Data to Oppress Minority Segment”
by Mario Solis Burgos geopolitics, cyber threats, the CISO, and the Board What’s happening now is that the ever-existing power struggles and conflicts that usually take place on land, sea, air, and space are now taking place as well in the network of Cyberspace. As Carl von Clausewitz said, “War is merely a continuation ofContinue reading “Cyber Geopolitics and You”
In the very near future, a sustainable and resilient organization will be able to combine accurate business continuity assessments & planning with comprehensive risk management in order to better and proactively face the “dreaded” and inevitable digital and business disruption that’s been coming everyone’s way for years now, and that will continue, with no endContinue reading “Cyber Security and Digital Transformation, what gives?”