Explore The World of Cybersecurity On Our Blog
Welcome to Cubic Consulting’s Cybersecurity Insights, where we explore the latest trends, strategies, and best practices in protecting your digital assets. Our Blog is dedicated to helping you stay informed and prepared, offering expert advice on everything from data protection and threat detection to compliance and security innovations.
-
There’s a pattern that comes up repeatedly in conversations with senior executives about NIS2. The regulation has been on their radar for a while, the IT department has raised it once or twice, and the …
-
14 views Business Leadership on a Global Stage: Guy Marong at the CXO 2.0 Conference Dubai | Cubic Consulting Global Leadership Business Leadership on a Global Stage From 8 to …
-
88 views When “It Won’t Happen to Us” Becomes a €480,000 Lesson | Cubic Consulting Cyber Resilience When “It Won’t Happen to Us” Becomes a €480,000 Lesson A Luxembourg SME …
-
How Does the Board of Directors Oversight Validate the Organization’s Cybersecurity Strategy?
by Guy MarongCorporate governance mandating cybersecurity board oversight aligns strongly with the culture of checks and balances by ensuring that all responsible parties carry out the organization’s cybersecurity strategy, preparedness, and execution. …
-
Cyber Essentials is an internationally recognized IT security standard created by the UK’s National Cyber Security Centre to ensure proper levels of cyber resilience, secure IT devices and processes are …
-
In 2024, cybersecurity predictions suggest a heightened risk of cybercriminal activity because of ongoing geopolitical tensions, significant elections in the U.S. and European Union, and the Paris Olympics. Cyber attacks …
-
Researchers at Cado Labs discovered a new Python-based hacking tool called Legion being distributed on Telegram. Known for its low detection rate on VirusTotal, this modular tool can be utilized …
-
The list of top ransomware groups changes yearly. Some groups that faced immense pressure from global law enforcement agencies became less active. Additional groups rose as a shadow of previous …
-
What are the Expected Changes and Challenges Regarding Cyber Threat and Risk Management in 2024?
by Guy MarongWhat should organizations expect in 2024 surrounding the growth of cybersecurity attacks from generative AI? Will state-sponsored cyber armies replace physical battlefield soldiers in times of conflict? What role …
-
What are the Top 2024 Cybersecurity Predictions Surrounding Ransomware and Generative AI Attacks?
by Guy Marong2024 will become a blend of legacy attack vectors and the inception of newer and more aggressive ransomware including personalization and double-threat extortion. What is in store for 2024 …
-
How Can the Board of Directors Increase Their Knowledge of Cybersecurity, Risk and Compliance?
by Guy MarongCybersecurity and business risks have become a significant concern for public companies and their board of directors. The board members either need to increase their cybersecurity knowledge and industry focus …
-
Understanding the need for effective cybersecurity risk management in today’s digital landscape and the role of the board of directors in cybersecurity risk management compels organizations to transform. How …
- 1
- 2