There is no Silver Bullet for Cyber Security
A customer recently asked me to obtain written assurance (from a technology vendor) that this vendor’s technology has never been breached and will...
A customer recently asked me to obtain written assurance (from a technology vendor) that this vendor’s technology has never been breached and will...
DDoS – Distributed Denial of Service (attack) is similar to road traffic jams during public riots or demonstration that cause gridlocks. In a DoS...
The risk of cyber-attacks for small and medium-sized enterprises (SMEs) Many small and medium enterprises are of the misconception that they are an...
During my professional journey as a project manager, I developed several business cases for approval. Most were approved. Some weren’t.
ISO 27001 designation formally confirms that the organisation meets physical, legal and technical controls that put Stickman on the same level as the...
Consumer-grade mobile applications have recently enjoyed excellent cut-through, whether in the consumer or business worlds.
Learn how to best invest in cybersecurity when your business has a limited budget, to ensure your information is secure.
SMBs have the exact same cybersecurity concerns as larger enterprises—perhaps even more so. Melinda Emerson writes in The Huffington Post that...
Understand DevSecOps - what it means, and how it ensures that cybersecurity is baked into the design and deployment of new software products.