architecture

Risks and Challenges in Migrating to the Cloud: The Perils of a “Lift and Shift” Approach

Introduction: Cloud computing offers numerous benefits to businesses, from scalability and cost-efficiency to enhanced collaboration and flexibility. As organizations increasingly adopt cloud solutions, it is essential to understand the risks associated with migration, especially for those planning a “lift and shift” approach. This article will delve into the key risks and challenges involved in migrating […]

Risks and Challenges in Migrating to the Cloud: The Perils of a “Lift and Shift” Approach Read More »

Artificial Intelligence – “Chronic Risk” per UK – What It Means For You

In recent years, the advancement of artificial intelligence (AI) has been both remarkable and concerning. While AI has the potential to revolutionize various sectors and improve efficiency, cybersecurity experts have constantly highlighted the risks associated with its rapid adoption. The United Kingdom has recently joined the chorus, labeling AI as a “chronic risk” to its national security. This article explores the concerns raised by the UK and provides valuable lessons for businesses to consider in addressing similar challenges.

Artificial Intelligence – “Chronic Risk” per UK – What It Means For You Read More »

Artificial Intelligence – AI Powered Cybersecurity Challenges and How To Address Them

Introduction As the field of Artificial Intelligence (AI) continues to advance, so does the ever-growing threat of cybercrime. Cybercriminals are quickly adapting to new technologies and exploiting vulnerabilities to conduct their operations. According to Verizon’s “Data Breach Investigations Report,” the average cost of a data breach has risen to $4.24 million, with ransomware accounting for […]

Artificial Intelligence – AI Powered Cybersecurity Challenges and How To Address Them Read More »

Lessons Learned from the Russian ‘Midnight Blizzard’ Hackers Targeting Microsoft Teams: A Cybersecurity Architecture Perspective

Introduction: The cyber threat landscape continues to evolve, with state-sponsored hackers perpetually finding new ways to exploit vulnerabilities and launch targeted attacks on organizations. The recent resurgence of the Russian state-sponsored group known as Midnight Blizzard, or Nobelium, has raised concerns within the cybersecurity community. This article aims to summarize the content related to their […]

Lessons Learned from the Russian ‘Midnight Blizzard’ Hackers Targeting Microsoft Teams: A Cybersecurity Architecture Perspective Read More »

Is Your Teammate is a Machine? – Assessing Business Use of AI Impacts On Cybersecurity

Introduction: Artificial intelligence (AI) is revolutionizing various aspects of our lives, including cybersecurity. CISOs (Chief Information Security Officers) are now faced with the reality of AI becoming both a friend and a force multiplier for adversaries. As AI is increasingly seen as a teammate, there are critical questions that CISOs must ask to effectively embrace […]

Is Your Teammate is a Machine? – Assessing Business Use of AI Impacts On Cybersecurity Read More »

Critical Aspects To Identify When Developing Cybersecurity Architecture

Developing cybersecurity architectures is not just a matter of selecting what tools or processes will be needed to secure a system or achieve a specific security goal.  While doing this is part of the process, it alone will not cover all aspects needed to ensure fit-for-use and fit-for-purpose cybersecurity.  Nor will it provide two-way traceability, […]

Critical Aspects To Identify When Developing Cybersecurity Architecture Read More »

Developing a Robust Cybersecurity Architecture Using SABSA: Top Priorities

In the age of increasing cybersecurity threats, an organization’s security strategy is of paramount importance. The Sherwood Applied Business Security Architecture (SABSA) provides a robust framework to help organizations build resilient cybersecurity systems. However, embarking on the journey to establish a comprehensive security architecture can be a complex task. Therefore, it is critical to focus […]

Developing a Robust Cybersecurity Architecture Using SABSA: Top Priorities Read More »

Scroll to Top