fbpx

This website uses cookies to ensure you get the best experience. More Information...

SECURITY LABS

WHITE PAPERS
Azure Case Study
Azure Case Study

Download Full Case Study The Azure Trend During the keynote day 2 of Microsoft Build 2016, Executive VP of Cloud & Enterprise division, Scott Guthrie, revealed some outstanding metrics related to the roll-out of Microsoft Azure to the current IT landscape. MS is growing at a rate of 120k new customers per month. There are […]

READ MORE
Integrating People, Process and Technology
Integrating People, Process and Technology

Download the White Paper The state of information security requires a continuous process of awareness, preparedness and readiness. It is a highly demanding, cross-domain activity that covers nearly all aspects of an organization and involves resources with different skills and levels of expertise. It is not a fixed cost nor a fixed duration project but […]

READ MORE
When and where cyber security took a wrong turn? And how you can regain control of your company’s security posture
When and where cyber security took a wrong turn? And how you can regain control of your company’s security posture

by Ian Cook The cyber security industry appears to be struggling to keep pace with a seemingly never-ending stream of new vulnerabilities exposing organisations to ransomware attacks, corporate espionage and worse. Trade shows such as InfoSecurity Europe 2017 host hundreds of new “off-the-shelf solutions” that claim to provide cybersecurity at a stroke. The million dollar […]

READ MORE
Hewlett Packard Enterprise (HPE) Worldwide Case Study about Obrela
Hewlett Packard Enterprise (HPE) Worldwide Case Study about Obrela

Today’s vendor driven approach to cybersecurity which continues to add more and more layers, is not sustainable. With a mathematical certainty every security model will inevitably fail at least once, regardless of the defense and technology sophistication involved.   Although they have invested in the latest technology, organizations – still – cannot detect cyber threats […]

READ MORE
Real Time Risk Management

Operational security requires a continuous process of awareness, preparedness and readiness. It is a highly demanding, cross-domain activity that requires effective communication and coordination between people that often have different knowledge and perspective for information security within the organization. It is neither a fixed cost nor a fixed duration project; rather an on-going business program […]

READ MORE
Cyprus Computer Society Conference Whitepaper

It appears that the external threats to an organization are increasing steadily, and may, in fact, be increasing more rapidly than is commonly reported. To combat cybercrime, a set of management procedures and an organizational framework for identifying, assessing and mitigating risks, is necessary. Rather than reacting to individual problems in an ad-hoc manner these […]

READ MORE
Cyber-Insurance

Today, infrastructure encompasses computer technology and key business processes and        is increasingly web-based. Thus, the availability and security of computer networks and web sites have become a critical component of an organization’s risk profile. Even though preventative security steps can be taken by companies, there is no silver bullet that can make businesses completely secure.  […]

READ MORE
Critical Infrastructure Protection

Information Security in critical infrastructures is a major challenge. Critical infrastructure can be damaged, destroyed or disrupted by deliberate acts of terrorism, natural disasters, and negligence, leading to loss of confidentiality, integrity and availability of the critical infrastructure information assets. Vulnerabilities in critical infrastructure not only create risk for systems, networks, information and public trust, […]

READ MORE
PKI Roadmap – A guideline for government institutions

PKI implementations have a great failure rate, statistically, due to absent or misplaced organizational structures, the role and the effectiveness of which is considered critical in the establishment of the relevant operational model, supporting policy and legal framework. The scope of this framework describes the delivery of PKI services by, and on behalf of, government […]

READ MORE