Cyber Security

All what you need to know about Cyber

The importance of HR's role in cybersecurity

The importance of HR’s role in cybersecurity –

The importance of HR's role in cybersecurity HR teams must keep security top of mind when hiring and onboarding employees and enforcing data privacy policies. Get advice on the procedures and mechanisms to do so. By Isabella Harford, TechTarget "A company culture is defined by HR because they're responsible for hiring people," said Erdal Ozkaya, author of Cybersecurity Leadership Demystified. HR influences a company's security...


Free Cybersecurity Training

Free Cybersecurity Training

Free Cybersecurity Training If you are student or someone with a limited budget, finding the extra money for training can be challenging.  In this post I will share some of my trainings with you , which I believe it will help you Don't forget the bookmark this page as I will continue to update is frequently Free Courses Shared in the Blog Post...


TechTarget CISO Erdal

Why CISOs need to understand the business –

Why CISOs need to understand the business While CISOs need technical skills, business skills help them push their team's agenda and get the support and funding they need to protect their company. By Isabella Harford, TechTarget When you hear the title CISO, you think of the person in charge of an organization's cyber and data security strategy. A key component of the CISO's...


10 Cybersecurity Myths

10 Cybersecurity Myths You Need To Stop Believing

10 Cybersecurity Myths You Need To Stop Believing 01. No one cares about you or Your business is too small for a cyber attack! 02 . Your Anti-virus is good enough 03 . Your Passwords are Strong and hard to guess 04 . Your industry doesn't have any cyber threats 05 . Bringing your own device is safe 06 . We have a Perfect Cybersecurity Strategy 07...


Practical Cyber Threat Intelligence

Practical Cyber Threat Intelligence – coming soon 1

Practical Cyber Threat Intelligence Gather, Process, and Analyze Threat Actor Motives, Targets, and Attacks with Cyber Intelligence Practices Easy to pronounce, write , say  I am proud to announce my sixteenth book , which is called "Practical Cyber Threat Intelligence" and will be very soon released via BPB Publishing. I wanted to share this news with you... When your business assets are threatened...


Manage Engine review

A review of Cybersecurity The Beginner’s Guide : Informative Review (March 22 )

A review of Cybersecurity The Beginner's Guide Special thanks to Manage Engine for revieing my book and publishing it in their web site . You can read the review in ManageEngine web site via this link : A review of Dr. Erdal Ozkaya's book Cybersecurity: The Beginner's Guide The book Cybersecurity: The Beginner's Guide, authored by Dr. Erdal Ozkaya, covers a broad scope...


Vulnerability Scanner Tools

Top 10 Paid and Free Vulnerability Scanner Tools 2022

Top 10 Paid and Free Vulnerability Scanner Tools 2022 There are many tools that you can use to scan your organizations vulnerabilities, some free , some paid here is a list of 10 tools which I either used in the past or currently am still using.  So lets start with the basis What is a Vulnerability Scanner? Vulnerability scanners automate security auditing and can...


Cybersecurity Questions Boards Need to Address

4 Cybersecurity Questions Boards Need to Address and Beware of!

4 Cybersecurity Questions Boards Need to Address The world has changed a lot since the first case of COVID was found in Wuhan, the virus did not just effect our day to day life's but also our work .  As a board member of an organization how much do you understand about Cybersecurity ? Do you have the right advisors who...


CISO

CISOs End to End Security Operations – ( Part 2) Powerful Tips

CISOs End to End Security Operations This is the second part of the article, you can read the first part from here Leading auditing and compliance initiatives A CISO and an organization's security team are tasked with leading auditing efforts of the company's security systems and ensuring that a company complies with all the security standards and regulations that govern its operations. Auditing efforts include a thorough review...


Binalyze

Real time enterprise forensics platform : Great News €8.7 million …

Real time enterprise forensics platform For the ones they don't know ; I am part of the Board of Advisors team at Binalyze which develops a real time forensic platform. EU Startup 's just supported us with €8.7 million , and showcased us in their web site. Below is the full story : By : Patricia Allen Enterprise forensics platform Binalyze has just raised €8.7...