Horac How to create a Threat Intelligence Program The Role of Threat Intelligence in Modern Security Organizations are under constant threat from a wide range of cyberattacks, from opportunistic malware to highly targeted operations by advanced threa... Dec 10, 2024
Horac How to plan your Cyber Security Budget In the last few years, cyber security becamea necessity for organizations of all sizes. Cyber attacks are becoming more sophisticated and the cost of failure can range from devastating financial losse... Dec 7, 2024
Horac Firewalls, Layer by Layer The Importance of Multi-Layer Defense in Modern Cybersecurity Relying on a single layer of protection is no longer sufficient to secure web applications in today's cybersecurity landscape. Threats are... Nov 27, 2024
Horac Learn Aikido to secure your systems, code and cloud! What is Application Security Testing? From shopping and navigating to banking and communicating, software is what drives everything today. It makes sense then that applications became prime targets fo... Nov 19, 2024
Horac AI governance with ISO/IEC 42001 In a world increasingly driven by artificial intelligence (AI), ensuring that these systems are developed, deployed, and managed responsibly is no longer a choice—it’s a necessity. Enter ISO/IEC 42001... Nov 12, 2024
Horac Continuous Learning Cyber threats are changing all the time, and just when we think we’re ahead, something new emerges. For anyone in cybersecurity, this constant shift means one thing: learning can never stop. Keeping u... Nov 6, 2024
Horac Vendor Risk Management Introduction In today's interconnected business environment, organizations rely heavily on third-party vendors for various services, from cloud computing and software development to logistics and cust... Oct 28, 2024
Horac Guide to NIS2 Incident Reporting The NIS2 Directive (Directive (EU) 2022/2555) is the EU’s latest effort to bolster cybersecurity across its member states, with a particular focus on enhancing the resilience and cybersecurity of esse... Oct 15, 2024
Horac Navigating GDPR Compliance Introduction As organizations increasingly handle more and more personal data, ensuring compliance with the General Data Protection Regulation (GDPR) has become an essential part of most businesses. G... Oct 7, 2024
Horac Building an Effective ISMS - Part 8: Strengthening Business Continuity Introduction In today’s fast-paced and interconnected world, disruptions to business operations can have far-reaching consequences. Whether it’s a cyberattack, natural disaster, or system failure, the... Sep 30, 2024
Horac Building an effective ISMS - Part 7: Internal Audit Introduction An internal audit is a critical step in the ISO 27001 certification process, providing an opportunity to assess the effectiveness of your Information Security Management System (ISMS) bef... Sep 24, 2024
Horac Building an effective ISMS - Part 6: Key Implementation Steps Before the Internal Audit Introduction Completing the Statement of Applicability (SOA) is a significant milestone in your journey toward ISO 27001 certification. The SOA defines which security controls are relevant to your org... Sep 16, 2024