 Your new post is loading...
 Your new post is loading...
|
Scooped by
JC Gaillard
April 22, 2017 2:46 AM
|
Every day, the digital infrastructure is targeted with new cyberthreats – including advanced hacks, phishing or even DDoS. The only true constant is change.
|
Scooped by
JC Gaillard
April 21, 2017 2:20 AM
|
The Cyentia Institute used surveys and interviews with corporate board members and CISOs to identify specific cyber risk issues resonating in boardrooms.
|
Scooped by
JC Gaillard
April 20, 2017 2:50 AM
|
Hybrid operating models can work and bring value around GRC but as long as the dynamics of trust and efficiency are preserved.
|
Scooped by
JC Gaillard
April 19, 2017 2:08 AM
|
Over 20 percent of enterprises will have digital security services devoted to protecting business initiatives using devices and services in the Internet of Things by year end 2017, , report, iot, internet of things, gartner, cyber security, CISOs, Chief Information Security Officer, byod
|
Scooped by
JC Gaillard
April 17, 2017 2:42 AM
|
The decision to build an internal Security Operations Center (SOC) versus selecting a Managed Security Service Provider (MSSP) to handle operational information security concerns can be a difficult and time consuming task for organizations seeking to improve their security posture. This post will explore advantages and disadvantages of both options and provide context around my personal experience with helping build a SOC and select an MSSP.
|
Scooped by
JC Gaillard
April 16, 2017 2:26 AM
|
Cyber-attacks can originate from anywhere, but there appears to be an unabated trend of pointing the finger on either "sophisticated attackers" or, more blatantly, naming and blaming nation-states like China and Russia (alright, maybe North Korea and Iran). The truth about attribution (who is the attacker) is often overlooked for something more dramatic, especially in situations where sensitive information or brand reputation is at risk. Specifically, we see businesses often try to save face by blaming attacks on state actors when they failed to make . . .
|
Scooped by
JC Gaillard
April 15, 2017 2:02 AM
|
To secure products across the supply chain, the automotive sector must develop new ways to collaborate.
|
Scooped by
JC Gaillard
April 13, 2017 2:38 AM
|
Every 10 years, something comes along in the world of IT that is so big, so important, that shrewd people build wildly successful careers on just that one
|
Scooped by
JC Gaillard
April 12, 2017 2:08 AM
|
Most executives recognize the growing threat posed by cyberattacks, but few are putting the security strategy in place to help keep information safe.
|
Scooped by
JC Gaillard
April 12, 2017 2:02 AM
|
Organisations must make sure they have the right strategy in place for device and person-based identity and access management.
|
Scooped by
JC Gaillard
April 11, 2017 2:02 AM
|
Cyber resilience is a full-board issue, not just an IT problem. A new WEF report outlines 10 principles to help boards get on board with resilience efforts
|
Scooped by
JC Gaillard
April 10, 2017 1:59 AM
|
Cybercriminals using Ransomware-as-a-Service (RaaS) can now easily start an illegal online enterprise targeting victims all over the globe.
|
Scooped by
JC Gaillard
April 9, 2017 2:06 AM
|
How do we deal with the human element of cyber security without losing our souls?
|
|
Scooped by
JC Gaillard
April 21, 2017 2:22 AM
|
Improve communication between chief information security officers and boards of directors: 5 big gaps and 10 recommendations in the Cyber Balance Sheet survey.
|
Scooped by
JC Gaillard
April 21, 2017 2:15 AM
|
OVER a couple of days in February, hundreds of thousands of point-of-sale printers in restaurants around the world began behaving strangely. Some churned out bizarre pictures of computers and giant robots signed, “with love from the hacker God himself”. Some informed their owners that, “YOUR PRINTER HAS BEEN PWND’D”.
|
Scooped by
JC Gaillard
April 20, 2017 2:45 AM
|
From phishy e-mails to weak passwords, it can seem like the Internet is a minefield of cybersecurity breaches waiting to happen to you and your company. So it’s no surprise that an estimated 95 percent of cyber attacks are caused by human error. Considering the shortage of easily digestible information on how to guard companies from data breaches, employee cybersecurity training is a crucial step in turning your workforce into a strong line of defense against hackers.
|
Scooped by
JC Gaillard
April 18, 2017 1:33 AM
|
OPINION | The reality is that threats are bound to find their way in, so companies must find ways to build layers and adapt.
|
Scooped by
JC Gaillard
April 16, 2017 2:39 AM
|
The auto industry needs to drive automotive cybersecurity principles and actively protect consumer data before regulators define the rules of the road. Here are 5 tips for protecting your consumers and your company’s agenda.
|
Scooped by
JC Gaillard
April 15, 2017 2:10 AM
|
La cybersécurité doit impliquer l’intelligence de l’homme dans le bon fonctionnement de la blockchain.
|
Scooped by
JC Gaillard
April 14, 2017 2:45 AM
|
Post-truths are changing the face of the planet on both a macro and micro level, and human beings are the weak link in this chain
|
Scooped by
JC Gaillard
April 12, 2017 2:33 AM
|
The constant drip-feed of cybersecurity scare stories has not translated into public awareness.
|
Scooped by
JC Gaillard
April 12, 2017 2:05 AM
|
Peter Cohan shares insights from his career and latest book to explain the importance of security in the boardroom and what boards and security leaders need to advance their relationship
|
Scooped by
JC Gaillard
April 11, 2017 2:05 AM
|
Cybercriminals have the advantage, thanks to the incentives for cybercrime creating a big business in a fluid and dynamic marketplace.
|
Scooped by
JC Gaillard
April 10, 2017 2:13 AM
|
When it comes to security, only perfect practice makes perfect. Still, many IT teams rush through the motions in a mad dash to show signs of progress.
|
Scooped by
JC Gaillard
April 9, 2017 2:07 AM
|
Outsourced security services have benefits and drawbacks for enterprises. Here's a look at the pros and cons of using MSSPs.
|