The Internet of Things (IoT) is the foremost tech topic of the day. And for good reason: By connecting the unconnected through sensors and networks, and consolidating and analyzing the data generated, the IoT offers truly world-changing benefits for all verticals in all segments. Read about the four critical steps that companies should ensure to […]
On Wednesday (April 5), Terence Rice, VP and chief information security officer at Merck & Co., told the Subcommittee on Oversight and Investigations of the House Committee on Energy and Commerce that healthcare cybersecurity still has a long way to go. Read why healthcare cyber security is a serious concern on Pymnts.
Read Paul Mah take a look at Google’s cyber defense on Data Center Dynamics : Google need a good security story. It wants users to trust it with their content and their business processes. To do that, its cloud-based services have to do a demonstrably better job than its rivals, and in house security teams. […]
Read why Thambipillai Srikanthan says that cyber security is the next economic battleground on Channel News Asia : There are few parallels to the breakneck speed at which Singapore has transformed itself from a rural backwater into a gleaming, urban financial hub in less than 50 years. And there is barely time to pause for breath […]
Read how the cyber criminals thrive on misaligned incentives and executive overconfidence on Enterprise Innovation : Cybercriminals have the advantage, thanks to the incentives for cybercrime, while defenders are hard-pressed to keep up as they often operate in bureaucratic hierarchies, according to Intel Security. Based on interviews and a global survey of 800 cybersecurity professionals, additional […]
Read ten tips for security microservice architecture according to Scott Matteson on Tech Republic : Microservices are an innovative way to accelerate and improve software development. The term refers to application subcomponents (think ingredients) which can be developed separately and which often focus on one specific function. Read his full article here.
Cybercriminals didn’t use to be so obvious. If hackers infiltrated your corporate network, they would do everything possible to avoid detection. It was in their best interests not to alert a victim that they’d fallen victim to cybercrime. Read the executive’s guide to dealing with ransomware attacks on ZDNet.
AT&T, IBM, Nokia, Palo Alto Networks, Symantec and Trustonic are joining forces and combining their expertise to help tackle today’s top Internet of Things (IoT) security challenges. The IoT Cybersecurity Alliance will combine industry-leading security providers and IoT experts. The group will research and raise awareness of ways to better secure the IoT ecosystem. Read about […]
IT decision makers and C-level executives both believe it is the other’s job to manage the response to a cybersecurity incident, according to new research from BAE Systems. The British defense contractor polled 221 Fortune 500 C-level execs and 984 IT leaders in eight countries around the world including the UK, US, Germany, Australia, Singapore and […]
Read why Suketu Gandhi says that firms must consider digital as a never ending effort on CIO Insight : It’s no longer a topic for debate because everyone agrees: Digital matters greatly to today’s businesses. It is, in fact, one of only a few truly top-line growth tools executives have left. During the first decade of […]