Blog

Episode 05 – Preparing for Cyber Threats: The Power of Crisis Exercises – With Lester Chng

Lester Chng is a cybersecurity and crisis management professional and he has extensive experience in conducting exercises and establishing large-scale exercise programs in the financial services sector as well as the military. He has participated as the lead representative in multinational security exercises and has also orchestrated enterprise-wide live exercises. Lester is a former Naval [...]

Unlocking Your Cybersecurity Budget: A Detailed Guide to Leveraging CVSS, EPSS, and CISA KEV

[Post 30 - 30 in 30] Effective cybersecurity management involves leveraging a variety of tools and resources. Three such tools, CVSS (Common Vulnerability Scoring System), EPSS (Exploit Prediction Scoring System), and CISA KEV (Known Exploited Vulnerabilities), are critical for identifying, assessing, and mitigating potential threats. Harnessing CVSS, EPSS, and CISA KEV The first tool, CVSS, [...]

10 Must-Read Cybersecurity Books: Expand Your Expertise and Stay Ahead of the Game

[Post 27 - 30 in 30] As a cybersecurity professional, you understand the critical importance of continuous learning and staying ahead of the ever-evolving threat landscape. To further enhance your expertise and insights, we have curated a selection of 10 influential cybersecurity books written in the past decade. These books, authored by renowned experts, hackers, [...]

Where to Focus Your Company’s Limited Cybersecurity Budget: A Simplified Guide

[Post 25 - 30 in 30] Cybersecurity is no longer a luxury but a necessity. However, as the recession looms, budgets are becoming tighter, leading companies to rethink their cybersecurity investments. How, then, should businesses optimize their limited budgets to ensure robust cybersecurity? Let's break it down. A Bird's Eye View of Cybersecurity Threat Landscape [...]

AI Voice Cloning Threats and How to Protect Against Them

[Post 24 - 30 in 30] Voice cloning technology, an emerging risk to organizations, represents an evolution in the convergence of artificial intelligence (AI) threats. This technology is currently being abused by threat actors in the wild, capable of defeating voice-based multi-factor authentication (MFA), enabling the spread of misinformation and disinformation, and increasing the effectiveness [...]

Building a Security Operations Center: A Comprehensive Guide for Businesses of all Sizes

[Post 23 - 30 in 30] Building an effective SOC is not a small task. It's a considerable commitment of resources, time, and skill, but also a significant step towards ensuring your business's cybersecurity. This article will break down the key aspects of creating a SOC for small, medium, and large companies, addressing the estimated [...]