Welcome to Octave Consulting Group - Securing your peace of mind against online threats!

21 Slip Point Lane

St. George's GE02, Bermuda

08:30 AM - 6:30 PM

Monday to Friday

online trust
New York Privacy Act Would Be Considerably Tougher Than California’s Bill

Just as legal experts have been predicting for nearly a year, individual U.S. states are starting to develop their own privacy legislation similar in form and content to the California Consumer Privacy Act (CCPA). The first state to follow the lead of California is New York State, which[…]

Read More
‘No More Obscurity’ – Octave Consulting’s Founder & Chairman Discusses Privacy and Online Surveillance at Summer Davos

Octave Consulting’s Founder & Chairman Niel Harper participated in a panel discussion on the impact of online surveillance on society at the World Economic Forum’s Annual Meeting of New Champions (Summer Davos), particularly looking at individual privacy rights and the power dynamic between data subjects versus corporations and[…]

Read More
Targeted Espionage-as-a-Service Takes Hold on the Dark Web

One in four underground merchants offer advanced hacking services, once reserved for APTs and well-funded organized crime gangs. The cybercrime underground has become a service-driven, on-demand economy, including making available targeted corporate espionage services. According to an analysis, about 40 percent of Dark Web merchants offer spearphishing-as-a-service and[…]

Read More
ISACA issues new audit programs for blockchain, CASBs and GDPR

Auditors face an onslaught of new technologies, systems and regulations to incorporate into assessments. New audit programs from global technology association ISACA give auditors additional frameworks for toolkits to provide assurance for blockchain, cloud access security brokers (CASBs) and the EU GDPR. The Blockchain Preparation Audit Program helps organizations[…]

Read More
Why We All Need MANRS?

Mutually Agreed Norms for Routing Security (MANRS) is a global initiative, supported by the Internet Society, that provides crucial fixes to reduce the most common routing threats. Network operators of all sizes can help secure the Internet’s routing infrastructure. By implementing four defensive actions, network operators and Internet Exchange[…]

Read More

Archives