Identity and Access Management (IAM) is a set of processes and technologies...
CATEGORIES
cybersecurity
Challenges of Cybersecurity
Cybersecurity is one of the most significant concerns facing businesses and...
Attacks targeting employees are the main cause of avoidable breaches
Attacks targeting employees are the main cause of avoidable breaches...
Aligning security and business strategies
Aligning security and business strategies In today's digital age, businesses face an ever-increasing risk of cyber-attacks. As a result, aligning security and business strategies has become critical...
Strengthening Cybersecurity in the Tourism Sector: How IAM Services Can Help
Strengthening Cybersecurity in the Tourism Sector: How IAM Services Can Help In Soffid we understand the importance of cybersecurity in the tourism sector. With the industry's increasing reliance on...
Cybersecurity while traveling
Cybercriminals have been targeting airports, and the travel industry in general due to the fact people tend to let their guard down when they travel. This posture is doubly compromised when you are...
Cyber-Attacks Set To Become “Uninsurable”
Cyber-Attacks Set To Become "Uninsurable" This is the stark assessment from Mario Greco, chief executive at insurer Zurich, one of Europe’s biggest insurance companies, speaking to the Financial Times. Amid growing concern among industry executives about large-scale...
Transforming risk into a strategic advantage
Transforming risk into a strategic advantage The need for a conscious, holistic approach to governance, risk, and compliance (GRC) has never been more critical to organizations. As the business environment changes, companies need to evolve their GRC strategies to...
Cybersecurity Law Code
Cybersecurity Law Code There is a European Directive, Directive 2016/1148, regarding the measures aimed at guaranteeing a high common level of security in the networks and information systems of the Union. This Directive has a couple of articles related to the...
Ransomware: To pay or not to pay
Ransomware: To pay or not to pay The main goal of hackers when carrying out a ransomware attack is to demand a ransom in return and profit. The 64% of Spanish companies agreed to pay the ransom requested by cybercriminals and 43% of them did so to become operational...