This articles looks into the recent revelation on Microsoft's Storm0508 attack
read moreTrue C vs False C - Case study on the role CISO - Part 4
This multi part article looks into the argument whether CISO is a True C or a False C role
read moreTrue C vs False C - Case study on the role CISO - Part 3
This multi part article looks into the argument whether CISO is a True C or a False C role
read moreTrue C vs False C - Case study on the role CISO - Part 2
This multi part article looks into the argument whether CISO is a True C or a False C role
read moreTrue C vs False C - Case study on the role CISO - Part 1
This multi part article looks into the argument whether CISO is a True C or a False C role
read moreCISO on crosshair
This article looks into increasing liability of CISO in the industry.
read moreDigital Asset Series: Cyber Risk Management for Trustees
This articles looks into a framework to establish cyber risk management for digital asset trustees
read moreZero Days, Breaches and Reprise
This thought piece is reflected on current affairs
read moreDigital Assets: Custodian vs Trustee[]()
This articles into digital asset custodians and the importants of its cyber risk management
read moreBarracuda ESG vulnerability
This article examines the recently released vulnerability affecting Barracude ESG
read more