Author - Erdal

Cybersecurity Metrics

Cybersecurity Metrics To Report To The Board – With 2 great examples

Cybersecurity Metrics to Report to the Board Information Technology (IT) is all about metrics. Each and every system creates logs, and in a mid-size organization, the number can be exceedingly high. The same applies to security, of course. It is clear that the Board will not care about every system; they certainly tend to leave day-to-day IT management to the CIO...


Free Event

Cyber Threats and Breach Protection – Free Webinars 2022

Cyber Threats and Breach Protection Cybersecurity Ventures expects global cybercrime to reach $10.5 by 2025 - up from $3 trillion in 2015. With this staggering growth putting businesses of all sizes at risk, it’s essential that organizations understand the latest threats and trends defining the 2022 threatscape. Join key industry professionals and leaders in this three-day Cyber Threats and Breach Protection Summit...


A CISOs End to End Security Operations

A CISOs End to End Security Operations (all in 1)

A CISOs End to End Security Operations In this article you will learn what a CISO does daily: Leading auditing and compliance initiatives A Chief Information Security Officer (CISO) and an organization's security team are tasked with ensuring that a company complies with all the security standards and regulations that govern its operations. They also lead auditing efforts of the company's security systems. ...


Posted By Category: Cybersecurity LeadershipTags: Comments: Comments Off
Network Security

DIFFERENCES BETWEEN EDR AND SIEM?

DIFFERENCES BETWEEN EDR AND SIEM? Nowadays, cybercriminals use sophisticated and complex strategies to infiltrate a network. That is the reason why cyberattack cases have been on the rise over the past few years. COVID-19 is not helping either, as 43% of workers have made mistakes that had security repercussions. Because of this problem, there is a need for a strong cybersecurity solution...


Tag Heuer Connected Calibre E4 Review

Tag Heuer Connected Calibre E4 Review – Honest Guide

Tag Heuer Connected Calibre E4 Review Here is the honest review of the brand-new Tag Heuer Connected Edition 4 comprehensive review. At the end of the video, you will also find Tag Heuer Connected vs Apple Watch Hermes, as well as Garmin Fenix 2, Fossil Gen 6 and the Apple Watch 7 visual comparison. https://youtu.be/94TCbZ15yRU If you would like to read the script,...


MANAGED DETECTION RESPONSE

WHAT IS MANAGED DETECTION AND RESPONSE?

WHAT IS MANAGED DETECTION AND RESPONSE? Organizations — no matter how big or small — are finding it harder to fight cybersecurity threats today than a few years ago. A recent Enterprise Strategy Group (ESG) survey revealed that 63% of organizations claimed that it is harder to analyze threats today than it was 2 years ago due to the ever-evolving threats,...


Cybersecurity Attack and Defense Strategies v3

Cybersecurity Attack and Defense Strategies 3rd Edition

Cybersecurity Attack and Defense Strategies v3 We are very pleased to announce that the 3rd edition of our award-winning Cybersecurity book from Packt is already available for pre-order at Amazon. My dear friend Yuri Diogenes  and I worked together on this project again to fully update the book and we are very happy with the result. You can now Pre-order  our book...


EDR

WHY EDR SOLUTION IS BETTER THAN ANTIVIRUS ?

WHY EDR SOLUTION IS BETTER THAN ANTIVIRUS Let's start first with the definition of EDR or Endpoint Detection and Response. It is an endpoint security solution that monitors end-user devices to detect and respond to cyber threats, it also  records and stores endpoint-system-level behaviors (logs), uses various data analytics techniques to  block malicious activities and provides remediation suggestions to restore affected...


enterprise it world mea

UAE Banks Enhances Cyber Security Posture by Emphasizing on User Education

UAE Banks Enhances Cyber Security Posture by Emphasizing on User Education “It’s really important to educate the employees and communicate about the threat landscape to ensure they partner in the CISO’s efforts of strengthening the security system.” Dr Erdal Ozkaya, CISO at Comodo Cyber-attacks have increased exponentially since the pandemic globally and across the UAE. Remote working significantly increased the surface area of...


SEC

CISOs Into Americas Boardrooms – 2022

CISOs Into Americas Boardrooms The SEC Is About To Force CISOs Into America’s Boardrooms What changes will boardroom cyber expertise bring about to the cyber industry, cyber risk, and corporate governance? An article by Bob Zukis via Forbes  This year is the twentieth anniversary of the U.S. legislation known as The Sarbanes-Oxley Act (SOX). The SEC moved quickly on SOX given the existential threat...