May 2023 Blog

May 2023 Blog

A Primer on Vulnerability Assessment and Penetration Testing (VAPT) One of the most useful things a corporation can do to improve its cybersecurity, is hire external experts like OmniSecuritas to conduct a Vulnerability Assessment and Penetration Testing (VAPT). What...
April 2023 Blog

April 2023 Blog

April 2023 Blog Obfuscation – A Threat Actor’s Favorite Tactic One of the major concerns that companies have today is how to remain secure and prevent cyberattacks given the increase in such attacks and the increase in a company’s vulnerability due to digitization. As...
March 2023 Blog

March 2023 Blog

A Threat Intelligence Approach Versus a Threat Hunting Approach to Cybersecurity Have you ever tried three-dimensional chess? It is very hard to play and even harder to win. Cybersecurity is like that. In cybersecurity, it is no secret that the threat actors are...
February 2023 Blog

February 2023 Blog

February 2023 Blog A Brief Overview of Threat Actors                                                                                                            State-Sponsored           Organized Crime        Individuals/Insiders           Hacktivists In 2023 we are...
January 2023 Blog

January 2023 Blog

January 2023 Blog Cybersecurity and Leadership – Lessons Learned As we launch into 2023, I am reminded of some exemplary leaders that I had the privilege of working with over the almost 39 years of my professional career. If you are in a pensive mood, as one often is,...
December 2022 Blog

December 2022 Blog

December 2022 Blog Observations from 2022 – A Year in the Life of a Cybersecurity Company I trust all the readers of this blog have had an enjoyable and restful holiday season. We wish you all the very best success and good health in 2023! As we look back on 2022 from...
November 2022 Blog

November 2022 Blog

November 2022 Blog Government and Private Sector Cooperation in Cyberdefense and the Impact on Your Organization As 2022 draws to a close, we are seeing an emerging trend in the cybersecurity industry: the emergence of much more stringent laws and associated penalties...
October 2022 Blog

October 2022 Blog

  Dependency Versus Autonomy – What Are Cybersecurity Solution Vendors Seeking? In this month’s blog, I would like to explore the basic concept of ‘DEPENDENCY’ versus ‘AUTONOMY’ in the application of cybersecurity technology to solving common cybersecurity...
September 2022 Blog

September 2022 Blog

  What Honeybees Can Teach Us About Cybersecurity I would like to quote Gianna Whitver, Bees & Cybersecurity | VP of Marketing, Votiro | Co-Founder, Cybersecurity Marketing Society | Founder, LeaseHoney | Podcast Host for this month’s blog content. I am very...
August 2022 Blog

August 2022 Blog

The Psychology of Cybersecurity. Cybersecurity is largely driven by psychology. What I mean by this, is that the threat environment is mostly comprised of human interactions and behaviors with a technological component behind it. It is a given that we need and benefit...
July 2022 Blog

July 2022 Blog

Where’s the Beef? Many Endpoint Detection and Response (EDR) companies are very large and well provided with significant advertising budgets and creative staff to generate marketing campaigns that emphasize their Artificial Intelligence (AI), Machine Learning (ML) and...
June 2022 Blog

June 2022 Blog

The Philippines is perhaps the perfect country to launch a business. The country is blessed with a large and growing population with an average age of less than 26 years old and a robust and thriving economy. Over the past many years, it has developed a solid...