Showing posts from February, 2020

Cyber Threat Intelligence

Introduction For cybersecurity measures to remain effective by the people who use make to protect systems and networks requires knowledge and awareness of threats and attacks potential or current. This is where cyber threat intelligence defined as the   organisation, analysis and refinement of  information about potential or current attacks that threaten an organisation comes into play . This post aims to serve as an introduction and brief overview of cyber  threat intelligence.  The primary purpose of threat intelligence is helping organisations understand the risks of the most common and severe external threats, such as  zero-day threats , advanced persistent threats ( APTs ) and  exploits . Although  threat actors  also include  internal  (or insider) and partner threats, the emphasis is on the types that are most likely to affect a particular organisation's environment. Threat intelligence reports often include in-depth information about specific threats in different busine

Data Dignity

What it Means and Why it Matters Data dignity can be defined as a person's right to have their data and information to be treated ethically and for the individual to have choice and control over how their data is used. From a cybersecurity perspective, this matters because while data dignity is more of an ethics issue the practical elements of ensuring data dignity fall partly under cybersecurity especially when it comes to data protection and privacy controls.  Application of Data Dignity At the moment users might feel empowered but at the same time, they don’t. Distrust is high. And if the technology companies believe that consumers really like to share their data because they think it will make everything better and they “love” them, think again: many have simply given up when it boils down to their data, let alone, their privacy. They feel powerless, not empowered because they know they really don’t know what happens with their data and can’t control it. It’s