Tag "Cyber Security Strategy"

Back to homepage
Software

CISOs: Make 2020 the year you focus on third-party cyber risk

While cybersecurity professionals are certainly aware of the growing threat posed by sharing data with third parties, many seem to lack the urgency required to address this challenge. Click here to

Software

Top Four Cyber Security Challenges Tech Leaders Need to Watch Out for

To build Cybersecurity into every product and system, C-suite members should gain a better understanding of the cyber-risks to which their organizations are exposed. Click here to view original webpage

Software

Enterprise Cybersecurity: Three Topics to Discuss With Your CISO

As a consumer, I appreciate that many products and services have become so intuitive that companies can seemingly foresee our needs and offer future recommendations based on our preferences and

Industry Insights

Transact with trust: Improving efficiencies and securing data with APIs

Developments in integration and APIs have provided businesses with huge benefits. Together, they provide businesses with newfound opportunity to unlock new revenue sources by making data more accessible rather than being stacked

Software

New Year’s Resolutions: Cybersecurity Goals For 2020 And Beyond

Looking back at 2019 and earlier, it’s clear that businesses have struggled to build effective cybersecurity programs. Now that 2020 is here, the days when a couple of security engineers

Industry Insights

When the Criminals are Caught – A Tale of Successful Cybersecurity

Some of the best stories about cyberattacks are ones that have a happily ever after – when the cyber criminal is caught. That’s the recent case with APT20, a group

Industry Insights

Smart cities are on the rise, what are the dangers?

A combination of job prospects, local amenities and other attractions is drawing more people to city living than ever before. Indeed, the UN estimates that by 2050 two-thirds of the global population

Industry Insights

Burner phones are an eavesdropping risk for international travelers

In recent years, burner phones have become an obligatory part of the international business traveler’s toolkit. But though these devices are designed to minimize the amount of stored data available

Identity Theft

Data ownership vs. data processing: A moral dilemma?

Work around data seems to never end. Between collection, sharing and use – the burden of this falls onto the shoulders of the CISO, the broadness of which, seems to be

Software

How Financial Services Firms Can Improve Cybersecurity

Organizations can address prevalent threats, obtain buy-in from leadership and build an advanced cybersecurity program. The financial services industry experiences 35 percent of all data breaches, according to Forbes, earning it the dubious