HP recently announced the findings of two new reports titled “Rebellions & Rejection” and “Blurred Lines & Blindspots” – comprehensive global studies assessing organizational cyber risk in an era of remote work. The global pandemic… Read More »New report on remote working finds alarming security issues
Abu Sadeq is currently the Founder and CEO at Zartech where his mission is to empower organizations to obtain greater cybersecurity maturity. Abu is a certified Chief Information Security Officer (C|CISO) and has a Master of Science degree in Management Information Systems from the University of Texas at Dallas. He has diverse industry experience in Aerospace & Defense, Chemical, Telecom, Healthcare, Oil & Gas, and Consumer Goods. Abu has extensive experience in creating strategies and plans that define IT/Security operational excellence. Abu is also the creator of Cyberator® a sophisticated cybersecurity, governance, risk, and compliance solution.
Social engineering, in the context of information security, is the art of manipulating people so they give up confidential information. This is a type of confidence trick for the purpose of vital information gathering. It… Read More »Social Engineering Attacks and How You Can Protect Yourself
I’ve always been a big fan of TED (Technology, Entertainment, Design) Talks. If you’ve never watched a TED Talk before, you are missing out on one of the most creatively-stimulating, informational series available today. I’ve… Read More »The 6 Ted Talks every leader should watch
Continuation from part 1 The cybersecurity industry has fed and, to a large extent, continues to feed off fearmongering. As a result, organizations are spending millions of dollars on shiny security products that are not… Read More »How to build your security strategy and roadmap: Part 2
Since the advent of the internet, businesses of all sorts, sizes, and locations have tried to explore new and larger markets to capture. It has provided them with new opportunities for which they work competently,… Read More »How to build your security strategy and roadmap: Part 1
Ransomware has taken a center stage, should organizations pay to retrieve their files?
With employees forced to work from home due to the pandemic, securing the home network should be a top priority. Here are few DIY steps that can be really useful even for the non-tech savvy person.
The impact of a major cyber-attack to an organization’s brand, reputation, and business operations can be catastrophic. Weaknesses in information security can jeopardize your mission, threaten your profitability, and invite fines and penalties from regulatory bodies.
In order to protect the U.S. defense supply chain from foreign and domestic cyber threats, and reduce the overall security risk of the sector, the Department of Defense is mandating that all contractors that conduct business with the DoD have to be CMMC certified by a certain date.
This is a ‘must-read’ for cyber and risk professionals that fulfill a daily crucial, global mission, and compete in one of the most intense careers in the world.