Cyber Security | July 3, 2018

Cyber Security Incident Management

An Incident is an event that might be, or could lead to loss of,or disruption to business operations. Incident Management The goal is to Minimize negative impact, Restore business quickly […]


Share this:

Business Continuity | June 29, 2018

Third Party Risk Management – Why is it required

Companies having a global presence would often be doing business with various third-parties to offer the end product or service. Choosing a wrong third-party could cause very serious finance and […]


Share this:

Cyber Security | June 28, 2018

Artificial Intelligence(AI) role in Cyber Security

AI or Artificial Intelligence, maybe defined as the Intelligence demonstrated by machines.It is also known as Machine Intelligence. AI was coined by John McCarthy, an American Computer Scientist in 1956. Today it is […]


Share this:

Cyber Security | June 28, 2018

Cyber Warfare – The Internet battleground

Spreading of virus and cyber attacks have become a common headlines nowadays.Technology have moved to a era of disruptive cyber actions to sabotage the opponent for better or the worse. […]


Share this:

Basics | June 27, 2018

Risk Treatment Methods

Risk – The potential for loss, damage or destruction of an asset as a result of a threat exploiting a vulnerability. The effect of risk can be positive or negative. […]


Share this:

Cyber Resilience | June 25, 2018

GDPR value add on Resilience

Data Privacy is a major concern for any person as well as privacy protection is critical to consumer and employee trust when an organization is concerned. When a law comes […]


Share this:

Basics | June 25, 2018

Risk, Threat and Vulnerability

Risk, Threat and Vulnerabilities are the technical terms that are frequently used interchangeably. Although they are related to each other, they have different meanings. Consider a  situation like you are […]


Share this: