RESTER INFORMÉ

Découvrez nos derniers articles et notre vision du secteur de la cybersécurité.

Guy Marong's latest article published on Paperjam

Cubic Consulting in the press Discover Guy Marong's latest article published on Paperjam's website. "Cybersecurity, a strategic issue" (in French) Read the article

Do SMEs need a CISO? How unprecedented growth in cyberattacks calls for appointing a CISO!

Cyberattacks continue to grow at an unprecedented rate, and SMEs (Small and Medium Enterprises) find themselves in a logjam of regular intrusion attempts and incidents. Given the limited resources and budgetary constraints, the most common question is, do SMEs need a CISO? With cyberattacks becomi...

Virtual Workforce and Workplace, and the role of a vCISO (Virtual CISO) in the Post-Pandemic World

Today, in the midst of a ravaging pandemic, business entities have been increasingly adopting virtual workplaces and virtual workforce solutions. Hence, enterprises globally are feeling a pressing need for hiring a virtual CISO (vCISO). Moreover, the focused efforts from a vCISO, his exp...

How to Hire The Best Cloud Security Consultants For Your Organisation

Cloud security consultancy services provide organisations with tools, technologies, and guidance on policies so they can safeguard their cloud environment from various cybersecurity threats. This article discusses best practices to hire the most suitable cloud security consulting firm for an o...

Aftermath Of A Ransomware Attack

Detection, Prevention, Negotiation, And Recovering Your Information Assets Safely Malicious actors infiltrate information systems and networks having vulnerabilities, lurk in the dark, and attack when these vulnerabilities can be exploited the most. It may cause massive damage to organizational in...

A guide to compare SIEM, SOAR, and XDR for SMES and SMBS from a complexity and cost perspective

When it comes to effective and efficient incident management for your business enterprise, you do not want to leave any stone unturned to keep your valuable information assets safe. This article gives you insight into the best solution for your enterprise- SIEM, SOAR, or XDR when dealing with incide...

Invest in data security now to avoid costly GDPR fines

Since the GDPR was adopted in 2018, there has been a significant increase in the size and quantity of data protection fines. Whilst the regulators have in 2020-21 been more lenient due to the financial hardship encountered by many businesses during the Coronavirus pandemic, we can expect the Data Pr...

Guy Marong's latest article published on Paperjam

Cubic Consulting in the press Discover Guy Marong's latest article published on Paperjam's website. "Cybersecurity, a strategic issue" (in French) Read the article

Do SMEs need a CISO? How unprecedented growth in cyberattacks calls for appointing a CISO!

Cyberattacks continue to grow at an unprecedented rate, and SMEs (Small and Medium Enterprises) find themselves in a logjam of regular intrusion attempts and incidents. Given the limited resources and budgetary constraints, the most common question is, do SMEs need a CISO? With cyberattacks becomi...

Virtual Workforce and Workplace, and the role of a vCISO (Virtual CISO) in the Post-Pandemic World

Today, in the midst of a ravaging pandemic, business entities have been increasingly adopting virtual workplaces and virtual workforce solutions. Hence, enterprises globally are feeling a pressing need for hiring a virtual CISO (vCISO). Moreover, the focused efforts from a vCISO, his exp...

How to Hire The Best Cloud Security Consultants For Your Organisation

Cloud security consultancy services provide organisations with tools, technologies, and guidance on policies so they can safeguard their cloud environment from various cybersecurity threats. This article discusses best practices to hire the most suitable cloud security consulting firm for an o...

Aftermath Of A Ransomware Attack

Detection, Prevention, Negotiation, And Recovering Your Information Assets Safely Malicious actors infiltrate information systems and networks having vulnerabilities, lurk in the dark, and attack when these vulnerabilities can be exploited the most. It may cause massive damage to organizational in...

A guide to compare SIEM, SOAR, and XDR for SMES and SMBS from a complexity and cost perspective

When it comes to effective and efficient incident management for your business enterprise, you do not want to leave any stone unturned to keep your valuable information assets safe. This article gives you insight into the best solution for your enterprise- SIEM, SOAR, or XDR when dealing with incide...

Invest in data security now to avoid costly GDPR fines

Since the GDPR was adopted in 2018, there has been a significant increase in the size and quantity of data protection fines. Whilst the regulators have in 2020-21 been more lenient due to the financial hardship encountered by many businesses during the Coronavirus pandemic, we can expect the Data Pr...
FREE
2-hour FREE risk assessment