The people on the inside of our organizations are sometimes the biggest risk. Insiders who leak data, sell data or sabotage operations are hard to stop because they have legitimate access to the assets we are trying to protect. How can we handle this then? Technology for stopping insiders can be useful - but computer … Continue reading Human friendly insider threat management
Incident response is difficult for many small businesses. Here's a practical approach to defining a working playbook when there is no specialist team to take care of cyber attacks for you.
SIPOC cyber is a structured process for mapping information assets to business processes. Get a free template and get started today!
Cybehave's June security note is on #ransomware - how to prepare to avoid paying criminals to get your data back
Threat modeling is essential for building a good defense in depth strategy. Integrating threat intelligence and a systematic approach to risk evaluation will help you secure better decisions. Read how Cybehave is working to automate the most difficult parts of threat modeling for you.