Is Your Focus On Compliance Undermining Your Cyber Security Play?
Security vs Compliance Security and compliance very rarely intersect – but are often misconstrued as being two sides of the same coin. Many...
Security vs Compliance Security and compliance very rarely intersect – but are often misconstrued as being two sides of the same coin. Many...
Implementing the right cybersecurity team structure is crucial to managing your security risk and cost. Here is how to put together the perfect team.
Cyber security remains a growing area of risk for Australian organisations this year. We predict seven key cybersecurity trends for 2019, ranging...
A customer recently asked me to obtain written assurance (from a technology vendor) that this vendor’s technology has never been breached and will...
DDoS – Distributed Denial of Service (attack) is similar to road traffic jams during public riots or demonstration that cause gridlocks. In a DoS...
The risk of cyber-attacks for small and medium-sized enterprises (SMEs) Many small and medium enterprises are of the misconception that they are an...
During my professional journey as a project manager, I developed several business cases for approval. Most were approved. Some weren’t.
ISO 27001 designation formally confirms that the organisation meets physical, legal and technical controls that put Stickman on the same level as the...
Consumer-grade mobile applications have recently enjoyed excellent cut-through, whether in the consumer or business worlds.