Home i-SCOOP – latest articles

i-SCOOP – latest articles

Five behaviors that make highly effective CISOs stand out

In a world where digital transformation is rapidly creating new opportunities but simultaneously new challenges, the required skills and roles of cybersecurity executives, such as Chief Information Security Officers (CISOs), are also changing. Of course, this is not so much...

CNAPP adoption: Cloud Native Application Protection Platform drivers

The number of organizations implementing a Cloud Native Application Platform (CNAPP) is rising with the surge in multi-cloud strategies as an adoption accelerator since complex distributed cloud environments require the kind of integrated security approach CNAPPs can enable. Cloud-native application...

SaaS security in an expanding reality of third-party connected apps

Cloud security on the level of SaaS (Software as a Service) is less straightforward than people often think, especially now that the use of SaaS applications and SaaS-to-SaaS connections is more vast than ever and SaaS security is confronted...

Over a quarter million enrollments for ISC2 CC cybersecurity certification

In the late 1980s, the International Information System Security Certification Consortium, abbreviated (ISC)², was founded. It is an originally American nonprofit organization dedicated to training and certifications of cybersecurity professionals. On Aug. 17, 2023, the organization announced that it...

TQM (Total Quality Management) in a Quality 4.0 context – meaning and role

TQM stands for Total Quality Management. It is an approach to management that focuses on continuously improving organizational processes, products, and services. TQM aims to meet or exceed customer expectations and customer experience by involving all employees in the...

The impact of remote work from a mobile security perspective: work ahead

The number of cyberattacks and cyber risks continues to rise. In 2022, we again broke several cybercrime and cybersecurity records, including regarding the cost of a data breach and phishing, to name a few. The increased cybersecurity concerns have not...

The record-breaking average cost of a data breach in 2022

The global 'DataSphere' continues its exponential growth, with more data being created, captured, and replicated than ever before in history. Consequently, it seems logical that organizations try harder to avoid data breaches and leaks, even if not all data...

Why cyber risk (exposure) is increasingly challenging to manage

Companies appear to be having an increasingly difficult time assessing cyber risk exposure, making managing cyber risk a more challenging task than ever. There are a bunch of reasons why such is the case. Before looking in more detail at...

The attack surface and importance of attack surface management

The rapid and continuous expansion of organizations' attack surface and digital footprint has led to (external) attack surface management being one of the most important cybersecurity trends in 2022.  Attack surface management (ASM) is hot. In fact, several factors are...