Welcome to the CyberIQs blog

In today’s digital age, information security is a critical concern for organizations of all sizes and industries. With the increasing frequency and severity of cyber attacks, organizations must take a proactive approach to protect their sensitive data and systems. One way to ensure that an organization’s information security program meets industry standards and best practices is through HITRUST certification.

All three certifications-CCSP, CCSK, and CCAK-focus on different aspects of cloud security and cater to different professional needs. Here’s a comparison of these certifications to help you better understand their differences and target audiences.

In the digital age, cyber warfare has emerged as a significant aspect of national security. As countries strive to protect their information systems and critical infrastructure from malicious cyberattacks, they have also developed their own offensive capabilities. 

Cloud computing is pervasively growing in importance for almost all businesses. Therefore, developing and managing secure workloads in the cloud is necessary and security on the cloud has become a significant concern for organizations due to increased cyber-attacks.

We are so excited to share this with you…


Russian cyberattacks and invasion of Ukraine have led governments on both sides of the Atlantic to worry that the situation could spread to other countries, triggering an all-out cyberwar. The government of Ukraine and its banking system have recently been targeted with cyberattacks attributed to Russia.


Small and medium sized businesses will face a variety of cybersecurity threats in 2022. Learn how to protect yourself and your organisation from these cyber threats.


Security experts have described the Log4j vulnerability as one of the most serious ever. Earlier this month, information security experts learned about a zero-day vulnerability in Apache Log4j, a widely used Java logging library that could be exploited to remotely execute code.

This month as part of our cyber interview series, Rob Van Os talks to us about his journey in cyber, the SOC-CMM assessment methodology and the MaGMa framework. He also tells us what it is like to work in a SOC, what training cyber professionals should have and tips on career progression within a Security Operations Centre.

In our first inspiring cyber interviews post, we talk to Shirin about her cyber career as a SOC professional. Shirin talks us through the challenges she has experienced as a cyber professional, and gives us valuable advice about what really matters and makes a difference in cyber.