Category:
Cybersecurity Strategy
Cyber Strategy: Important Now, More Than Ever
Cybersecurity has never been a simple proposition. Organizations that once approached cybersecurity in simplistic terms as this are paying high prices for those misconceptions. Now, more than ever, protecting your organization’s information requires strategic thinking on various dimensions. Organizations need innovative, strategic thinkers to light the way.
5 Reasons Cyber Security Tabletop Exercises are Essential for Every Business
Regardless of your industry, cyber attacks are inevitable if you are not prepared. Whether you work in critical infrastructure, financial services, healthcare or any other field, it's crucial to understand that these threats can affect anyone. Being prepared is essential in safeguarding your organization against potential cyber incidents, because it's no longer a matter of ‘if’ it will happen but a matter of ‘when’ it will happen.
CSPM, DevSecOps, and PoLP: How Warden Supports the Three Pillars of Cloud Security
Cloud security relies on three essential pillars: CSPM (Cloud Security Posture Management), DevSecOps (Development Security Operations), and PoLP (Principle of Least Privilege). These pillars form a solid foundation for comprehensive cloud security, protecting infrastructure, data, and applications. Read on to know how Horangi's tool, Warden, ensures resilience against emerging threats in the dynamic cloud environment.
Cybersecurity Awareness for Small Businesses
4 Cybersecurity Statistics You Should Be Aware of Today And 4 Things You Can Do Today To Minimize The Associated Risks
5 Quick Actions You Can Do Now to Improve Your Third-Party Security
Third-party vendor risk management is a challenging and critical area for companies of any size or industry, given how much organizations rely on third-party vendors for the processing of data. These 5 quick actions serve as an initial guide for you to improve your vendor risk management swiftly.
What Do Squid Game and Cybersecurity Have in Common?
Read about the striking similarity between the global smash series Squid Game and cybersecurity and learn more about what goes in a hacker’s mind and how Horangi can help you counter it with our in-depth services (Offensive, Strategic, Threat Hunting) and a tailored approach to minimize your attack surface.
How Cybersecurity Can Be A Sales And Growth Enabler
More companies today are looking at cybersecurity as a sales accelerator for their businesses. Why is this so and how can you make it work for your organization? From the conversations we’ve had with other companies, we break it down for you.
Work-From-Home Cybersecurity Explained: Best Practices for Secure Remote Work [Infographic]
How can hackers exploit work-from-home vulnerabilities? What impact do the new Work-From-Home arrangements have on vulnerability to cyber threats on an organizational and individual level? Learn how to protect yourself and your company's critical assets.
Adapt and Overcome: The Way of The Remote Workforce
How do you kickstart the cultivation of a remote workforce? What operational and security considerations should be taken into account? And how can a remote working culture be secured-by-design?
The Cybersecurity Ceiling
Making a cybersecurity budget a percentage of the IT budget is systematically implying that cybersecurity will never be more important than information technology. The limitation of cybersecurity capabilities by tying their budget to the IT budget is that ceiling.
On-Demand Webinar: The Science Behind Peacetime Cybersecurity Operations
Can your organization be battle-tested even without a cyber attack? Learn how leading organizations take advantage of peacetime to run proactive cybersecurity operations.
A Two-Pronged Approach To Beat Leak & Shame Ransomware
Southeast Asia is seeing an uptick in Leak & Shame ransomware campaigns. Ransomware operators extort affected organizations by threatening to leave their systems encrypted. What can your organization do?
From Ashes to Phoenix: Crises and Innovation
Most would agree that the COVID-19 situation has brought on a crisis of global proportions. Nothing short of the entire planet has been brought down by this virus. Many have described this as a once-in-a-generation kind of crisis. These truly are dark times.
On-Demand Webinar: Cybersecurity Strategy Used By Top Businesses
With cybersecurity teams hamstrung by limited budget in 2020, how do CISOs from leading organizations in Asia consistently drive results for their businesses?
Would You Lie To Your Doctor? Healthcare Cybersecurity In A Pandemic
Over the past two decades alone, our planet has experienced different outbreaks and pandemics ranging from SARS, to Swine Flu, and now COVID-19. How should companies in the healthcare industry prepare for the future?
Cybersecurity In The Time Of COVID-19: Is It Really Different?
In the COVID-19-stricken world, what exactly has changed? What is still the same? We venture into the New Normal of remote work to understand what it means for cybersecurity.
Using Zoom The Horangi Way: Security Best Practices
With most businesses now operating remotely, it is more crucial than ever that innovation and cybersecurity are not compromised. As Zoom users ourselves, we at Horangi want to help you continue using the teleconferencing platform securely.
Work-From-Home: Key Security Considerations For Employees
Amid the ongoing coronavirus pandemic, we are seeing a global trend of employees being told to socially distance themselves and Work from Home (WFH).
We Walk Together: A Risk Management Journey In The Cloud
Over the past four years, Horangi has had the great privilege of working with some of the biggest and most influential companies in Southeast Asia. Horangi CTO and Co-Founder Lee Sult highlights the lessons he's learned in the cloud adoption journey.
Building An Effective Cybersecurity Team In A Workforce Deficit
Cybersecurity has been around as long as computers have existed, but has only seen mainstream attention in the past decade or so. Why are there over 1 million cybersecurity jobs in the United States remaining unfilled?