Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Top 10 Digital Risk Protection Software Solutions

It’s no longer a question of ‘if’, but ‘when’ and ‘how’ cyber threats will target an organization. This reality demands a proactive approach to digital security. Recent data shows that over 85% of organizations have experienced a cyber attack supporting this need for vigilance. These incidents range from data breaches to brand impersonation, each carrying significant risks to business integrity and continuity.

Steps to Creating a Statement of Applicability (SOA)

A Statement of Applicability (SOA) is a document you draft as part of achieving compliance with ISO 27001 and other ISO standards. The SOA reviews the internal controls you have decided to include in your information security management system (ISMS) and why you selected those controls. Writing a thoughtful, comprehensive SOA is crucial to your ISO 27001 compliance journey.

DevOps Security - Best Data Protection Practices

DevOps has already become an integrated part of almost every industry. Whether it’s technology, automotive, healthcare, or any other industry, it’s hard to imagine an organization that doesn’t rely on DevOps. Numbers speak better: the majority of consumers are from the technology sector – 44 %, yet there are a lot of organizations from other industries that depend on DevOps – financial, education, etc.

AppSec Vulnerability Management: Uniting AppSec and CloudSec

Businesses have come a long way in their individual journeys to digital transformation, all to enhance their customer and workforce experiences. This shift elevated the importance of both Application Security (AppSec) and Cloud Security (CloudSec) in safeguarding digital assets and ensuring infrastructure resilience.

7 Examples of Real-Life Data Breaches Caused by Insider Threats

Insiders know all the ins and outs of your organization’s infrastructure and cybersecurity tools. That’s why companies worldwide fall victim to numerous malicious and negligent insider security incidents every month, leading to data breaches and lots of other negative consequences. Such attacks may result in financial and reputational losses and might even lead to business disruption.

CISO Global Appoints Tech Veteran Brett Chugg To Board Of Directors; Chugg To Help Usher In Next Stage Of Growth

CISO Global has named Brett Chugg to its Board of Directors. With the appointment of tech veteran Chugg, CISO Global is well positioned for its next stage of growth underpinned by its software-first product platform strategy.

Obrela Achieves NCSC CIR Level 2 Assure Service Provider Status , Demonstrating Commitment to Cybersecurity Excellence

Obrela proudly announces it has been awarded the National Cyber Security Centre (NCSC) Cyber Incident Response (CIR) Level 2 Assured Service Provider status issued by CREST. This underscores Obrela's unwavering dedication to maintaining the highest standards of cybersecurity readiness and incident response capabilities.

A guide to insider threats in cyber security

With so many cyber security priorities to balance, it isn’t always easy to know where to start. The mistake that many organisations make is to view threats originating from outside as their sole focus. However, with insider threats proving a persistent presence, this can often be a very costly oversight. This guide seeks to provide clarity on the different types of insider threats you need to be aware of and the controls and processes you can put in place to defend against them.