Tag "Cyber Risk"

Back to homepage
Cloud

Don’t Let Insider Threats Rain On Your Cloud Deployment

Insiders can easily be more of a cyber threat to organizations than outside attackers, for the obvious reason – they’re already inside. Whether malicious or simply clueless or careless, they

Industry Insights

Part One: Understanding cyber security in accountancy

Emmy Hawker takes a deep dive into cyberspace, assessing how prepared accountancy firms and practices are for the ever-growing threat of cyber-crime. In June 2018, the UK’s technology sector was

Software

Bad security hygiene still a major risk for enterprise IT networks

Unpatched vulnerabilities, along with growing network and application complexity pose an ongoing security risk which could threaten the security of enterprise IT networks. Analyzing the biggest security findings over the

Industry Insights

The case for continuous automated security validation

Organizations must truly understand their vulnerabilities at all times to make the right risk mitigation decisions. Continuous automated security validation can provide that.Chinese military strategist Sun Tzu is quoted as

IT Compliance

Don’t build a maginot line of data security because without cyber security you are still vulnerable

Data security and cyber security overlap, but they are different, and there is a risk that if you focus too much on data security you could be left exposed. Bridewell’s

Software

Cybersecurity Implementation Versus Organizational Layers of Leadership

In view of the rapid evolution of technologies and tools that comes under the very broad term “digital transformation,” in my previous article we attempted to shed more light over the crucial influence

Industry Insights

35+ Powerful Cybersecurity Statistics to Know in 2019

Cyberattacks are nothing new, but they’re a growing problem for all types of businesses across all industries. Depending on the severity of the attack, there are a variety of defense

Software

Main threat source to industrial computers? Mass-distributed malware

Malicious cyber activities on Industrial Control System (ICS) computers are considered an extremely dangerous threat as they could potentially cause material losses and production downtime in the operation of industrial

Artificial Intelligence

Big tech poised to beat healthcare in reaping value from artificial intelligence, report says

Artificial intelligence will expose inefficiencies, improve medical decision-making and increase the quality of care, according to a new report from Boston Consulting Group. But the report also warned that companies

Identity Theft

Let’s Make 2019 the Year of Fewer Records Compromised in Data Breaches

The first quarter of every year produces dozens of reports that both reflect on the threats of the previous year and look ahead to understand how to avoid future security