Cyber Security

Cyber Security is about Risk Management. You cant eliminate Risk, but you CAN strengthen your defenses to reduce the likelihood of the Risk being realized. and minimize the harm caused when it is.

Quote by Alastair MacGibbon, National Security Advisor, Australian Cyber Security Center.


Every new technology comes with new vulnerabilities. In many cases, however, cybersecurity experts can learn from hacks of the past to close security gaps in the future.

The Internet is

The Internet is what we all have in common.
It's our inheritance for our children and children's children.
It's ours to cherish and use for the betterment of mankind.
It's also our task to assure and defend its absolute integrity.
And therefore nail even the smallest abuse to the virtual wall.
— Free after Wendell Berry

If security were all that mattered

If security were all that mattered, computers would never be turned on, let alone hooked into a network with literally millions of potential intruders
― Dan Farmer

Integrated risk management

Integrated risk management
An integrated risk management strategy focuses on creating a proactive, risk-aware culture, using contextualized risks to create outcome-based frameworks. An integrated risk management strategy bridges the functional aspects between organizations, culture and strategic business objectives. Brica contributes to a more realistic picture of risk analysis -- from which organization leaders can improve decision making.

BRI - Global Risk & Threat Intelligence

BRI is a Global Threat Intelligence, Risk Awareness and Early Warning Service, alerting you on ANY new risk potentially affecting your infrastructure, assets, staff, board, confidential data, and your organizations' reputation. Providing you with that precious awareness, knowledge and extra time to safeguard against and respond effectively to new threats your organization may be faced with.

If you spend more on coffee than on IT security

If you spend more on coffee than on IT security, you will be hacked. What's more, you deserve to be hacked
― Richard Clarke

Fix before you have to, not because you have to

Security industry is full of news on threat intelligence (Log/ SIEM generated etc), but totally overlooks that the availability of Pro-Active RISK Intelligence may greatly diminish the volume of threat intelligence. BRI warns you up-front of ANY possible risk that may hit YOUR Organization in the near future. More ahead in time and more comprehensive than any other available source.

The Benefits of Risk Intelligence

Risk Intelligence looks outside the organisation’s walls for relevant cyber activity trends facing similar types of organisations to better plan and prepare for impending threats to the business. This intelligence can provide the strategic insight necessary to direct resources and help guide internal tools and processes towards reducing an organisation’s cyber risk. Risk Intelligence helps you to PREVENT breaches and compromises in your organization.

You Can't Fix Security Flaws Unless You Know Them

24x7 Monitoring of any new risk that may threaten your organization. Fully customized to your organization's particular technology infrastructure, Industry, environment, and specific requirements. Enabling you to mitigate or minimize potential risks and threats. Pro-active in safeguarding your infrastructure, your data, and your organization's reputation.

Fixing flaws

Detecting flaws doesn't reduce risk; fixing them does. Risks can be identified and communicated between business and IT teams in a productive manner. With appropriate responses planned and resources in place, organizations with IRM-based strategies will be more equipped to deal with adverse outcomes, and likely suffer less financial loss.


Breaches often happen because security personnel and their executives become complacent, and rules, policies and procedures aren’t followed.................................................................PREVENT instead of having to DEFEND

Risks and Costs

There are risks and costs to a program of action—but they are far less than the long range cost of comfortable inaction.

John F. Kennedy



Identify Your Organization's Weak Points before Attack

Identify Your Organization's Weak Points before Attackers do.
Breaches and attacks at Fortune 100 banks, retailers, and government agencies have shown that traditional measures like firewalls, IPSes and SIEMs are not enough. If you check every single major breach recorded over the past few years, every single victim was already using next-generation firewalls, intrusion protection systems, anti-malware sandboxing technology.

The Marketing hype around SIEM's

Be Aware: Beyond all the hype that the Commercial Security Marketing generate; Siem systems identified advanced threat breaches less than 1% of the time.

To Be Ready for the Security Future, Pay Attention to t

The past should be neither ignored nor forgotten, especially in cybersecurity. However, security teams can easily overlook the past if it is not prioritized because of the rapid nature of the job. To stay one step ahead of hackers, find ways to use the past to better inform the present and secure a better future.

Blowing the hay away from the needles

The major problem companies around the globe have in common is that they focus their efforts in the wrong areas, not realizing the threats they face come from very simple security vulnerabilities. This is a global problem: All but the most security-focused of organizations are guilty of ignoring the simple issues. BRI has been designed to help you solve this problem.


We are outnumbered – the people that are doing bad things, whether it’s a nation-state type of activity or cybercrime – the good guys and gals were vastly outnumbered prior to the pandemic. It has a compounding effect to what was already a challenge… take all of this technology we are becoming more and more reliant on and it’s scaling in a massive pace.”

David Shearer, CEO of (ISC)2 on the cybersecurity staffing shortage that has become worse during the pandemic

The strong do what they can

The strong do what they can and the weak suffer what they must. - Thucydides

The Internet is the first thing that humanity has built that humanity doesn’t understand, the largest experiment in anarchy that we have ever had. - Eric Schmidt

Focus On Cyber Defence Rather Than Cyber Attack

Focus On Cyber Defence Rather Than Cyber Attack – Former NCSC Head

The world is indeed full of peril

The world is indeed full of peril, and in it there are many dark places; but still there is much that is fair, and though in all lands love is now mingled with grief, it grows perhaps the greater.
― J.R.R. Tolkien

Business Risk Intelligence & Cyberthreat Awareness

Your complete one-stop resource for Relevant, Focused, Timely and Actionable Risk Intelligence.

Business Risk Intelligence allows you to assume a more strategic position in the war against cybercrime. This enables you to better understand the threatscape, including expected attack trends and threat exposure. Resulting in recognizing attacks before they are happening in real-time and identifying new threats the moment they emerge.

Some cross-section samples of our latest Red alerts

Linux Kernel: Exploitable vulnerability in io_uring
2 minutes ago
SUSE alert SUSE-SU-2021:3125-1 (gtk-vnc)
3 hours, 51 minutes ago
SUSE alert SUSE-SU-2021:3123-1 (libcroco)
3 hours, 52 minutes ago
openSUSE alert openSUSE-SU-2021:3123-1 (libcroco)
4 hours, 54 minutes ago
SUSE alert SUSE-SU-2021:3121-1 (crmsh)
5 hours, 24 minutes ago
SUSE alert SUSE-SU-2021:3124-1 (transfig)
6 hours, 40 minutes ago
SUSE alert SUSE-SU-2021:3119-1 (postgresql12)
6 hours, 46 minutes ago
Hackers Alter Cobalt Strike Beacon to Target Linux Environments
7 hours, 7 minutes ago
Lokibot IOC FeedUpdated on 19th September 2021
8 hours, 5 minutes ago
SUSE alert SUSE-SU-2021:14800-1 (libcroco)
8 hours, 25 minutes ago
Apple fixes actively exploited FORCEDENTRY zero-day flaws
8 hours, 50 minutes ago
CVE-2021-26333 AMD Chipset Driver flaw allows obtaining sensitive data
9 hours, 18 minutes ago
For a full list of alerts please fill in the registration form to sign up for a two-week trial.
Login to your Account

For more information, fill out this form and we'll contact you as soon as possible.

Or email ​