George Mutune

I am a cyber security professional with a passion for delivering proactive strategies for day to day operational challenges. I am excited to be working with leading cyber security teams and professionals on projects that involve machine learning & AI solutions to solve the cyberspace menace and cut through inefficiency that plague today's business environments.
The Impact of the Coronavirus on the Cybersecurity Industry

The Impact of the Coronavirus on the Cybersecurity Industry

The Coronavirus is having an unbelievable impact on the cybersecurity industry. This virus is a game-changer when it comes to cybersecurity.

Current and Future State of Identity Access Management (IAM)

Current and Future State of Identity Access Management (IAM)

Top 20 Cybersecurity Practices that Employees Need to Adopt

Top 20 Cybersecurity Practices that Employees Need to Adopt

Cybersecurity Alliances – A Complete Guide

Cybersecurity Alliances – A Complete Guide

17 Trends to Consider for your Cybersecurity Budget

17 Trends to Consider for your Cybersecurity Budget

You need to understand these 17 trends when you are determining your cybersecurity budget...

6 Top Cybersecurity Disasters You Need to Know

6 Top Cybersecurity Disasters You Need to Know

Cybersecurity disasters have wreaked havoc over the past couple of years. The root causes of these disasters vary, but they are nearly all a result...

Top 12 Website Security Practices for 2022

Top 12 Website Security Practices for 2022

Hackers attack over 50,000 websites per day. The only way to stay secure is to understand and implement website security best practices.

22 Best Items for a Cybersecurity Checklist

22 Best Items for a Cybersecurity Checklist

A cybersecurity checklist is the starting point for any cybersecurity assessment. We explain the top security items that should be included.

19 Social Media Security Best Practices

19 Social Media Security Best Practices

Social Media Security for personal users and for business has quickly become one of the most important issues facing business and individuals.

Top 10 Cloud Security Best Practices

Top 10 Cloud Security Best Practices

These Cloud Security Best Practices are essential for every organization. Don't be caught overlooking or ignoring these or are setting yourself up for...

23 Top Cybersecurity Frameworks

23 Top Cybersecurity Frameworks

Cybersecurity frameworks are policies and procedures that are intended to keep an organization protected against hackers and malicious actors...

Ten Essential Cybersecurity Controls

Ten Essential Cybersecurity Controls

We outline the top 10 cybersecurity controls that are essential to protect organizations from cyber attacks and destructive breaches.

Compliance Regulations and the Future of Cybersecurity

Compliance Regulations and the Future of Cybersecurity

The Security Downside of SMS-based Multi Factor Authentication (MFA)

The Security Downside of SMS-based Multi Factor Authentication (MFA)

7 Easy Steps – How to Become a Cybersecurity Specialist

7 Easy Steps – How to Become a Cybersecurity Specialist

The easy steps that you should take now: how to become a cybersecurity specialist and be successful in the growing cybersecurity industry.

6 Work from Home Cyber Risks

6 Work from Home Cyber Risks

AI Weaponization

AI Weaponization