Cyber Security

Oct
01
The AI Paradox: Automating Away the Entry-Level

The AI Paradox: Automating Away the Entry-Level

AI is a game-changer, no doubt. It's like having a tireless assistant who can handle those repetitive, mind-numbing
2 min read
Aug
20
The Zero Trust Strategy Your Board Will Actually Understand (and Fund) đź”’đź’°

The Zero Trust Strategy Your Board Will Actually Understand (and Fund) đź”’đź’°

Remember that time some exec's email got hacked because someone clicked a phishing link? Or when that ransomware
2 min read
Aug
06
The Evolution of Zero Trust: From Architecture to Strategy

The Evolution of Zero Trust: From Architecture to Strategy

Have you ever questioned why the term 'Zero Trust' is increasingly referred to as a 'Strategy'
2 min read
Jul
26
Small startup vs big enterprise in the field of security

Small startup vs big enterprise in the field of security

In my career, I have been exposed to a huge number of companies of all sizes and industries. Often people
5 min read
Jun
20
Develop your Cyber Security skills and knowledge with these cool projects

Develop your Cyber Security skills and knowledge with these cool projects

Cybersecurity is a vast and complex field, and it can be difficult to know where to start if you’re
4 min read
Jun
09
How Much Coding is Involved in Cyber Security?

How Much Coding is Involved in Cyber Security?

I frequently see this debate on social media, especially in the “100-day cybersecurity challenges”. There’s always a battle in
3 min read
May
11
The Top Certifications in Information Security: How They Benefit Your Career

The Top Certifications in Information Security: How They Benefit Your Career

When it comes to IT and information security certifications, there are many options to choose from. But which one is
6 min read
May
04
Work-Life balance in Information Security Industry

Work-Life balance in Information Security Industry

The Information Security industry is one of the most desired, in-demand, and well-paid professions worldwide, and with the spotlight comes
4 min read
Jun
11
Third-Party: The Latent Threat Often Overlooked

Third-Party: The Latent Threat Often Overlooked

Most businesses nowadays outsource portions of their operations to third-party companies, either by not having capacity in-house or by wanting
4 min read
Oct
21
How to handle security incidents like a big enterprise

How to handle security incidents like a big enterprise

Incident response is one of the most important processes inside an information security team. The objective of the Incident Response team is to approach a security incident in a coordinated and organised manner aiming to stop or at least reduce the impact in the first phases.
6 min read