Read George Moraetes’ CISO’s guide for managing insider threats on Security Intelligence : Critical digital and physical assets are becoming increasingly vulnerable due to accelerated connectivity, differing global regulatory requirements, joint ventures and business partnerships and security weaknesses within complex multinational supply chains. Read his full article here.
Read Amy Adams’ cyber security guide for small and medium businesses on Goodmen Project : Computer security is better known these days as cyber security. It basically means keeping your computer protected from people who want to wreak havoc to its software and hardware. Keeping a very close eye on your device’s sensitive data is […]
Read Matt Little’s data breach survival guide on SC Magazine : It’s getting progressively harder – some would say impossible – to keep thieves, snoops and idiots out of sensitive company information. The Ponemon Institute’s 2016 Cost of a Data Breach report puts the latest average consolidated total cost of a data breach at US$ 4 million (£3 million), […]
There is no doubt that the CSO role has significantly developed and expanded in the past decade. From technology, to convergence, to legal considerations, the security executive requires broad, career-focused technical acumen across a large set of service areas while still serving as a business executive supporting the organization’s goals and strategies and managing his […]
Cyber and data theft is one of the fastest-growing threats to businesses of any size, ranging from one-person companies right up to big multi-nationals. In fact, the latest government figures suggest that nearly three-quarters of small businesses have suffered some form of information security breach, according to the Information Security Breaches Survey 2015. Read more […]
A team of experts, members from the Cyber Security Coalition, including B-CCENTRE, coordinated efforts to put together a guide to assist SMEs and other organisations to prepare for, deal with and follow up a cyber security incident. Read the entire Cyber Security Incident Management Guide here.
The Online Trust Alliance (OTA) released its 2016 Data Protection and Breach Readiness Guide, which provides prescriptive advice to help businesses optimize online privacy and security practices, and detect, contain and remediate the risk and impact of data loss incidents. Read about the new 2016 Data Protection and Breach Readiness Guide published by Online Trust Alliance (OTA) […]
NIST has just produced a draft special publication SP 800-150, the Guide to Cyber Threat Information Sharing. This is a draft released for public comment. Expect changes in the final version. But this is ready for your review right now. If you are a CIO, CISO, CTO or other enterprise IT professional you will learn lessons […]