CAPTUR
-
A Journey to the Highest Cybersecurity Maturity: Part 6
Requests Cycle Continue reading on The CISO Den »
Read More » -
Quantum-ready data security: Safeguarding information beyond binary
Abstract In the rapidly advancing landscape of quantum computing, the potential for revolutionary processing power also brings forth significant challenges…
Read More » -
The Human Risk Management Blueprint: Turning Strategy into Action
Human Risk Management (HRM) is no longer a concept confined to industry reports and vendor presentations—it’s becoming a critical operational…
Read More » -
Applying agile principles to public sector change — Matt Palmer
Right now at Jersey Cyber Security Centre we have two critical change projects: 1) creating and delivering a new public…
Read More » -
6 Dimensions to Cut Through the Noise
Hello CyberBuilders 🖖 Let’s talk AI security (don’t stop reading here, give me 2 mins!) It’s the new obsession in…
Read More » -
A Journey to the Highest Cybersecurity Maturity: Knowledge, Part 7 | by Vicente Aceituno Canal | The CISO Den
Knowledge Management Zoom image will be displayed Photo by Hector John Periquin on Unsplash Previously in this series: Knowledge Management…
Read More » -
Unveiling the Secrets of the Dark Web
Introduction The internet, often regarded as a vast and mysterious realm. It is not a singular entity but rather a…
Read More » -
Culture Has a Topology. Are You Mapping It?
You can’t change what you can’t see. And you definitely can’t optimize what you can’t map. If culture is the…
Read More » -
The Real Meaning Behind the Jargon — Matt Palmer
Cyber security is often conflated with the term confidentiality, but that is not correct. Traditionally, professionals tend to define it…
Read More » -
What Makes an Asset Risk Assessment Effective in a Threat-Driven World?
Industry experts with over a decade of cybersecurity experience recognize that the old ways of doing risk assessment just don’t…
Read More »