Tag: cyber security


Are CISOs Prepared to manage today’s security threat and achieve digital resilience?

As organisations embark on digital transformation journey, the CISOs role will expand and may even elevate in taking strategic decisions. Let’s take a look at the different hats the CISOs should don to build a cyber-resilient organization.


SECUDE Security Bulletin on SpringShell vulnerability

Spring4Shell is a server security vulnerability in the Spring Framework. Spring4Shell exposes an application to remote code execution, an attacker can possibly access all website internal data, including any connected database. It may also allow an attacker to access additional internal resources to gain more permissions or to make their way to other parts of an internal network.


The 10 Essential Checklist for a Successful EDRM Implementation

Many EDRM projects fail miserably due to poor planning and implementation. Here are the 10 essential checklist for a successful EDRM implementation.


Adjusting to New Cybersecurity Regulations in 2022

Cybersecurity is a leading concern for businesses in 2022. Here’s a closer look at how cybersecurity regulations landscape is shifting, why, and what businesses can do in response.


How the Ukraine-Russia Conflict Could Impact Cybersecurity

The cyber warfare of the Ukraine-Russia conflict solidifies what many security experts have been saying for years. Cybersecurity is a matter of national safety, so all organizations must consider it.


How to Address Cultural Change When Implementing a Cybersecurity Program

A company culture that prioritizes cybersecurity goes well beyond annual training sessions. It implements measures to encourage individual employees to utilize best practices for security on all their devices. Learn how to address cultural change when implementing a cybersecurity program.


The Top Cybersecurity Trends to Watch in 2022

Businesses will need new strategies to respond to the changing cybersecurity threat landscape. These cybersecurity trends are likely to show where the field is moving in 2022 and how businesses should prepare.


SECUDE Security Bulletin on LOG4J vulnerability

A security vulnerability in Apache Log4J a most commonly used logging package for java has been exploited by the hackers. The vulnerability can allow an attacker to execute arbitrary code by sending crafted log messages, has been identified as CVE-2021-44228 and given the name Log4Shell.


Cyber Security Transformation requires a Cyber Committed CEO

As enterprises rely more and more on digital technologies in all areas of business, and the attack surface grows, a broader security strategy is needed. Traditionally, enterprises have taken a bottom-up approach and IT department has been a separate entity. But today, what is needed is not just policies and procedures but a proper governance to keep information and data secure. That is why it is important to have a top-down approach and a cyber committed CEO.


Is data collaboration the key to improving cybersecurity?

In today’s collaborative world, data is constantly on the move, traveling outside firewalls and organizational boundaries.
A collaborative approach is needed to provide the most secure environment that can be least penetrated by hackers.