Showing posts from February, 2020

Cyber Threat Intelligence


For cybersecurity measures to remain effective by the people who use make to protect systems and networks requires knowledge and awareness of threats and attacks potential or current. This is where cyber threat intelligence defined as theorganisation, analysis and refinement of  information about potential or current attacks that threaten an organisation comes into play. This post aims to serve as an introduction and brief overview of cyber threat intelligence. 

The primary purpose of threat intelligence is helping organisations understand the risks of the most common and severe external threats, such as zero-day threats, advanced persistent threats (APTs) and exploits. Although threat actors also include internal (or insider) and partner threats, the emphasis is on the types that are most likely to affect a particular organisation's environment. Threat intelligence reports often include in-depth information about specific threats in different business or service areas…

Data Dignity

What it Means and Why it Matters
Data dignity can be defined as a person's right to have their data and information to be treated ethically and for the individual to have choice and control over how their data is used. From a cybersecurity perspective, this matters because while data dignity is more of an ethics issue the practical elements of ensuring data dignity fall partly under cybersecurity especially when it comes to data protection and privacy controls. 

Application of Data Dignity
At the moment users might feel empowered but at the same time, they don’t. Distrust is high. And if the technology companies believe that consumers really like to share their data because they think it will make everything better and they “love” them, think again: many have simply given up when it boils down to their data, let alone, their privacy. They feel powerless, not empowered because they know they really don’t know what happens with their data and can’t control it.
It’s the trade-off fallacy…