Our Blog

Risk Management in the Current Digital Reality of Organizations
Cybersecurity

Risk Management in the Current Digital Reality of Organizations

Last year, our head of Cybersecurity advisory services, Daniel Ferreira, PhD, in collaboration with Henrique S. Mamede and Nuno Mateus-Coelho, released an article titled “Risk Management in the Current Digital Reality of Organizations” (2023), as part of the book “Contemporary Challenges for Cyber Security and Data Privacy” (Mateus-Coelho and Cruz-Cunha, 2023). In this article, the […]

Cybersecurity Risks in Health Data and Measures to Take
Cybersecurity

Cybersecurity Risks in Health Data and Measures to Take

Daniel Ferreira, PhD, our head of Cybersecurity Advisory Services, recently published a chapter in collaboration with Nuno Mateus-Coelho, PhD, titled “Cybersecurity Risks in Health Data and Measures to Take” (Ferreira & Mateus-Coelho, 2023), part of the book “Exploring Cyber Criminals and Data Privacy Measures” (Mateus-Coelho & Cruz-Cunha, 2023). We were granted permission to share an […]

Ransomware Protection
Cybersecurity

Ransomware Protection

Ransomware attacks have become increasingly common, with cybercriminals using sophisticated techniques to encrypt victims’ data and demand payment in exchange for its release. Recently, a major Angolan financial institution was hit by a ransomware attack, causing significant disruption to their operations and potentially compromising sensitive customer data while highlighting the pressing issue. Ransomware attacks have […]

GRC: A Buzz Word With a Broad Scope
Cybersecurity

GRC: A Buzz Word With a Broad Scope

When we talk about GRC, the first idea that comes to mind is that we are talking about Governance, Risk and Compliance, and in fact this is correct, but this acronym can have various meanings depending on who refers to it, as well as how they interpret and embody it. What does GRC mean anyway? […]

Security Operations Center (SOC)
Cybersecurity

Security Operations Center (SOC)

SOC is a combination of people, processes, and technology in a centralized area responsible for monitoring and analyzing an organization’s security posture. The main objective of a SOC is to detect, investigate and respond to cybersecurity threats in a timely and effective manner. SOCs typically use a mixture of security tools and techniques, such as […]

New Cognito Launches the First Managed Cybersecurity Services Operation Center in Angola
Cybersecurity

New Cognito Launches the First Managed Cybersecurity Services Operation Center in Angola

New Cognito officially launched its new Managed Cybersecurity Services Operation, and related facilities and offices, including an up-and-running Security Operations Center (SOC). A Security Operations Center (SOC) is an important Cybersecurity structure, employing people, processes and technology to continuously monitor and improve an organization’s Cybersecurity posture while preventing, detecting, analyzing and responding to Cybersecurity incidents. […]

What is UBA, UEBA and SIEM
Cybersecurity

What is UBA, UEBA and SIEM

This article seeks to define and explain some common acronyms involved in today’s cybersecurity landscape. What is UBA? UBA stands for User Behaviour Analytics and is a threat detection analysis technology. UBA uses Artificial Intelligence (AI) and data science to understand how users normally behave and then find anomalous activities, which deviate from their normal […]

Vulnerability Scan vs Penetration Test
Cybersecurity

Vulnerability Scan vs Penetration Test

Vulnerability Scan and Pentest are often confused as the same service, but the reality is that we often acquire one but need the other. Both are important in their respective areas, necessary in an Information Security risk analysis and essential to ensure standards such as ISO 27001, CIS, NIST and others.  Vulnerability Scan – The […]

The Impact of Covid-19 on Access Control
Cybersecurity

The Impact of Covid-19 on Access Control

COVID-19 is changing the paradigm of cybersecurity in organisations, especially in the remote access aspect, usually provided by virtual private networks (VPN). This technology became over the years stable, and therefore underestimated, without undergoing a proper assessment of its impact on organizational security. With the exponential increase in remote access due to remote work caused […]

Multi-Factor Authentication
Cybersecurity

Multi-Factor Authentication

Multi-Factor Authentication (MFA) is the process by which multiple technologies are used to authenticate a user’s identity. This means that more than one credential is required to log into systems, applications and/or other digital assets. It is a fundamental part of the Zero Trust security approach that an organisation can adopt, as incidents of stolen […]

How can we help?
Contact Us