Strategy Roadmap for CIS Control #1: Inventory and Control of Hardware Assets

security of their data

A cybersecurity framework lays the foundation for your entire program and one of the keys for CISO to succeed. It not only helps CISO to streamline the cybersecurity activities but also helpful in communicating the state of cybersecurity to top management. But there is no black and white answer to which framework to choose. HIGH-LEVEL CYBERSECURITY STRATEGY Frank […]

Cybersecurity: Keeping Organisations Secure In The Post-pandemic Reality

With the UK government announcing changes in small increments to the lockdown restrictions, organisations are starting to consider the process of going back to business as ‘usual’.  The truth is that, post-pandemic, organisations won’t be the same, not all businesses will be running at full capacity, nor will their offices be the same, with social […]

Email Gateway – Best Defend Against External Email Threats

An email gateway (aka external SMTP server) is a server where all incoming and outgoing emails are processed and typically provide the following service: Anti-virus scanning on all inbound and outbound emails Anti-spam Management Quarantine Email Company email policy implementation such as message size permitted, allowable type of attachments, etc. Automatic logging and archiving of […]

Will Insecure Web Applications Dominate 2016’s News?

Ilia Kolochenko, CEO of High-Tech Bridge on the recent story about Citrix’s CMS being hacked into, which he believes should focus more on the insecurity of web applications than the Russian hacker angle. [su_note note_color=”#ffffcc” text_color=”#00000″]Ilia Kolochenko, CEO of High-Tech Bridge : “In 2012, High-Tech Bridge and Frost & Sullivan released a White Paper saying […]

Security Threats to Software Defined Network (SDN)

sdn and security threats

In Software Defined Network (SDN) architecture, the control plane is separated from the data plane and implemented in a software application. In this blog, we will briefly analyze the security threats to SDN because of this decoupling. The controller is the most vital component in SDN architecture mainly because it defines the data flows that occur […]