Cybersecurity Blog

There is no such thing as an "unhackable" system. In general, cybersecurity can be described as ensuring that there is no unauthorised access to an enterprise’s network, to...
13 October 2020
The Travelex cyber-attack (just like many others) contains overwhelming lessons about cyber incident response and cyber crisis management for those who wish to seek them out. We...
7 October 2020
In a 2020 joint report by the NCSC and KPMG UK, entitled ‘Decrypting Diversity’, out of the 1252 cyber professionals interviewed, only 13% identified themselves as part of a...
29 September 2020
The ultimate goal of any cybersecurity endeavour or cybersecurity training programme is to thwart an attack and emphasize on the need for training people and systems to recognise...
16 September 2020
You may have heard that a Cyber Tabletop Exercise is indispensable for businesses that want to be as secure as possible. But what exactly happens in a cybersecurity table top...
15 September 2020
Every business needs a fit-for-purpose cyber incident response plan to enable it to rapidly and effectively respond to a cyber-attack. This blog provides ideas on how you can use...
10 September 2020
In this article, we discuss combining Nmap and Metasploit together to perform port scanning and enumerate for vulnerabilities.
8 September 2020
To ensure that your business is safe at all times and your crown jewels are protected against malicious activities, you need to have a solid cyber incident response plan and you...
8 September 2020
A successful cyber-attack can be the downfall of any well-positioned business. Data breaches not only cause significant financial losses but are also the leading cause of a bad...
4 September 2020
Project Management & Cybersecurity Training have become inextricably linked today. Successfully planning and executing a business/IT project for a client is almost impossible...
4 September 2020
Senior Information Governance Officer, Tanya Fleming, shares her perspective on undergoing our NCSC-Certified cybersecurity training & how the trainer Amar Singh’s unique delivery...
4 September 2020
Artificial Intelligence (AI) and Machine Learning (ML) have become the kind of buzzwords that are used so often, it’s fair to say that they are almost abused. They are usually...
1 September 2020
Amar Singh, Founder & CEO of CM-Alliance and Patrick Bayle, Senior Systems Engineer at Cortex (a Palo Alto Networks company) delve into how Cortex’s XSOAR can automate 95% of all...
6 August 2020
Cyber threats loom large today. So, have you wondered what actually happens during a cyber-attack? Can cybersecurity training and specifically incident response training help the...
22 July 2020
There is a vast array of threat intelligence data out there and a variety of platforms that help businesses collect such insights. But is this data contextual, consumable,...
14 July 2020
Firewalls have made up a popular subject of study for a long time now. The CISSP expects you to understand the advantages and disadvantages of different types of firewalls. It...
13 July 2020
We discuss cybersecurity training for non-IT and non-technical business executives in this blog. As a bare minimum, these professionals must have a working knowledge of cyber...
7 July 2020
Selecting the right type of cyber incident response training has never been this important. No organisation today is exempt from being vulnerable to cyber-attacks, which makes...
18 June 2020
You can never be too prepared when it comes to cybersecurity and data privacy. For the health of your business, it is essential to continuously test your cyber incident response...
15 June 2020
Cyber Management Alliance, the global frontrunner in cyber crisis management and training, is delighted to announce that its highly popular course, Cyber Incident Planning &...
2 June 2020
In any discussion on cyber incident response & resilience, it is imperative to deliberate upon the subject of threat actors. After all, if you can’t identify who could potentially...
27 May 2020
We reviewed SAMA, QCB & NESA Regulations on Business Continuity Planning, Testing & Cyber crisis tabletop exercises and created an easy reference for you. We will be updating this...
24 May 2020
A cyber incident response plan is a straightforward document that helps you effectively and efficiently respond to and manage cybersecurity incidents. It outlines the incident...
22 May 2020
To discuss cyber incident response with the CEO, you must be familiar with ISO 27001, NIST's CSF, PCI-DSS NCSC'S Cyber Assessment Framework and other regulations and standards...
11 May 2020
Cyber incident response training is an important investment for today's business leaders. It's crucial that executive and management professionals throughout the organisation...
9 May 2020
One often tends to get entangled in the word ‘tabletop’ when one thinks of conducting a cyber tabletop exercise for their organisation. It is natural to think of this exercise as...
8 May 2020
We are often asked about the benefits of internal cyber incident response training over our public or online training. This blog talks of the advantages of running an internal...
7 May 2020
In this blog, I share why our clients who do ISO 27001 audits are including cyber attack tabletop exercises audits in their audit schedules.
6 May 2020
To ensure some sense of order when you are attacked, start by following the cyber incident response checklist.
5 May 2020
This is a very logical question for any data and cybersecurity professional looking to upgrade their professional credentials with the right certification. In this blog, we aim...
4 May 2020
If you’re one of those smart business executives who knows how important a cybersecurity tabletop exercise for their organisation is, you’ve won half the battle! The other half in...
2 May 2020
Your organisation may have a cyber incident response plan that it can fall back upon in case of a crisis, but you need to ensure it's fit-for-purpose. We show you how to achieve...
1 May 2020
Most online cybersecurity training programmes appear to skip over the important topic of Cyber Kill Chain.
30 April 2020
Cyber table top exercises are on the radar for all businesses that understand the importance of cybersecurity today. Find out what makes a normal cyber response test a really good...
21 April 2020
How to make the cybersecurity checklist PDF work for your organisation?
8 April 2020
You are under a cyber-attack. What’s the first thing that comes to mind?
3 April 2020
What is most challenging about building a strong cybersecurity team?
30 March 2020
Cyber Table Top Exercises help you test and evaluate the efficacy of your well-laid plans in a real-world situation. You have to ask yourself, when your organisation is under a...
27 March 2020
What is your advice to CISOs in the UAE?
26 March 2020
Good security practices and skills are just non-negotiable and because nobody seems to be talking about it, we simply had to.
25 March 2020
If you could outsource one security function – which one would it be?
24 March 2020
Cyber Management Alliance just concluded another successful event in Dubai for its vast community of cyber leaders and Infosec experts in the UAE. The exclusive invitation-only...
20 March 2020
How does one build a truly cyber-resilient business?
20 March 2020
The expectation - that security behaviours will change if your employees know what they need to do and if they know their firm’s security policies - is flawed. Knowledge is just a...
17 March 2020
What is the importance of automation in incident response?
16 March 2020
With the increasing frequency of business-impacting cyber crises, top executives of organisations are taking notice and rushing to ensure that they have cyber incident response...
6 March 2020
Legislation in the CISSP exam, in general, is not specific to any country. The exam does, however, expect you to know, at least at the definition/purpose level, the common...
6 March 2020
Should the Security Operations Centre or SOC be in-house, outsourced or hybrid?
14 February 2020
How important are automation & orchestration in Incident Response? India’s top CISOs answer that question at the Mumbai Wisdom of Crowds event
11 February 2020
Gathering insights, opinions and expertise from top cyber professionals in the world is one of the key objectives behind Cyber Management Alliance’s Wisdom of Crowds events.
7 February 2020