Demystifying Cybersecurity: going back to basics

Executives, board members and security professionals who are tasked with enterprise risk management are constantly bombarded nowadays with cybersecurity news concerning new forms of attack perpetrated by both novice and sophisticated assailants, from state sponsored cyber criminals to malcontent employees. These criminals are exploiting vulnerabilities in Information Technology (IT) systems and networks that were not designed to withstand this constant and repeated probing. The CERT Notes Database, which is maintained by Carnegie Mellon University, contains information regarding 3374 vulnerabilities that have been exploited by attackers.

Spotlight

Secure Matrix

Secure Matrix is a leading specialist information security and network consultancy firm, that provides managed security solutions, training and other value-added services across business verticals worldwide. The company employs and associates with an internationally qualified team of professionals who possess global experience and have the benefit of experience of some of the most complex projects in Information Security Auditing, Consultancy, Implementation and Product Development.

OTHER WHITEPAPERS
news image

The Cyber Resilience Index: Advancing Organizational Cyber Resilience

whitePaper | June 28, 2022

The World Economic Forum Centre for Cybersecurity – in collaboration with the Cyber Resilience Index working group and in partnership with Accenture – developed the global Cyber Resilience Index (CRI). The CRI provides public- and private-sector cyber leaders with a common framework of best practice for true cyber resilience, a mechanism to measure organizational performance, and clear language to communicate value.

Read More
news image

The Ethics and Security of Cloud Computing

whitePaper | October 17, 2022

Nearly four thousand years ago, Hammurabi engraved the laws of Babylon onto a stone plinth and revolutionized the codication of law. Today, lawyers of all walks of life are engaged in a new revolution, with the ability to practice law armed with nothing more than a tablet device and an internet browser—a revolution brought about, in large part, by the rise of cloud computing.

Read More
news image

What Is a Value Chain for Security

whitePaper | November 15, 2019

Cisco has architected and deploys a capability that continually assesses, monitors, and improves the security of our value chain throughout the entire lifecycle of our solutions.

Read More
news image

Closing the Human Error Gap in Cybersecurity

whitePaper | June 23, 2023

The increasing reliance on digital technology has made cybersecurity a critical concern for organizations worldwide. While technological advancements have provided businesses with unprecedented opportunities, they have also exposed them to a myriad of cyber threats. In this context, human error has emerged as a significant vulnerability. While an overwhelming majority of the human error related wrong decisions are unintentional, they can happen to anyone. This whitepaper aims to provide a comprehensive approach to closing the human error gap in cybersecurity, focusing on both cybersecurity awareness training and proactive security measures that minimize the need for users to be cyber smart.

Read More
news image

Proven Ways to Prevent Ransomware Attacks

whitePaper | September 22, 2022

Ransomware is one of the fastest-growing and most costly cyber threats. According to a recent Perimeter 81 survey of over 500 IT professionals, 76% of respondents reported that their company experienced an attack within their organization.

Read More
news image

Protecting Against Sophisticated Bot Attacks

whitePaper | November 18, 2022

Bot-generated attacks have risen in visibility, and defending against these attacks is now a priority for most organizations. Yet challenges persist in accurately identifying bot traffic; protecting a distributed, heterogeneous application environment from these attacks; and minimizing the impact to legitimate users while doing so. To address these issues, intelligent protection against sophisticated bots is a necessity. This should include strong analytics coupled with human expertise, a frictionless user experience, and consistent coverage across different architectures and platforms. F5 Distributed Cloud Bot Defense, built on Google Cloud, supports these requirements and can help prevent fraud and abuse against public-facing web applications.

Read More

Spotlight

Secure Matrix

Secure Matrix is a leading specialist information security and network consultancy firm, that provides managed security solutions, training and other value-added services across business verticals worldwide. The company employs and associates with an internationally qualified team of professionals who possess global experience and have the benefit of experience of some of the most complex projects in Information Security Auditing, Consultancy, Implementation and Product Development.

Events