top of page

Business of Security


Hackers and the Cult of Personality
In the 90s, hackers kept a low profile, especially after 1986. But of course, we weren't all cut from the same cloth.

ORNA
Jul 7, 20226 min read
Â
Â


What Is a Cyber Incident Response Program and Do I REALLY Need One?
You’re preparing to leave the office on a cool Tuesday afternoon when your desk phone beeps. It’s your IT guy, and it isn't good news.

ORNA
Jul 4, 20224 min read
Â
Â


Why Your Cybersecurity Budget isn't Working
Measuring the effectiveness of your cybersecurity program (and the associated investment in it) can be a tricky thing.

ORNA
Jun 29, 20222 min read
Â
Â


Can the U.S. Withstand a Cyberwar?
Until recently, the US has taken a rather passive approach as it relates to securing potential internet access points from threat actors.

ORNA
Jun 27, 20224 min read
Â
Â


New Charity Ransomware Forces Victims to Commit Good Deeds
The GoodWill ransom group requires the victims to complete three mandatory objectives that are to be performed socially.

ORNA
Jun 20, 20224 min read
Â
Â


UK Government Combats Malicious Apps With New Security Proposals
Perhaps, better security and privacy practices will be proposed to help minimize the impact of malicious apps and developers behind them.

ORNA
Jun 13, 20224 min read
Â
Â


All Out War on the Cyber Frontier: A Hacker’s Thoughts
As hacktivists, we can't categorize an entire country as the enemy. We can respond intelligently to the actions of the aggressors.

ORNA
Jun 10, 20226 min read
Â
Â


Canada Needs a National Security Strategy That Reflects Today’s Realities
Very little progress has been made that sets Canada on the proverbial map of strategic operators in the cyber warfare arena.

ORNA
Jun 9, 20224 min read
Â
Â


US CISA Offers List of Free Security Tools for Incident Response
These security measures serve as a rudimentary guideline for companies to adhere to, designed to help prioritize their security posture.

ORNA
Jun 6, 20224 min read
Â
Â


Mistakes, Delays, and Negligence Costs Effective Incident Response
Most skilled threat actors have an offensive response of their own in the event that they have mere seconds before losing connectivity.

ORNA
May 27, 20223 min read
Â
Â
bottom of page