Benchmarking, checkboxes and cyber hygiene
It’s often said that the cybersecurity and data privacy worlds rely too much on checkbox compliance exercises – and fail to get to grips with the real issues that put data and systems at risk. […]
It’s often said that the cybersecurity and data privacy worlds rely too much on checkbox compliance exercises – and fail to get to grips with the real issues that put data and systems at risk. […]
In this extended episode, we review the key cybersecurity events of 2022. And we analyse the likely developments, and priorities, for CISOs in 2023. In 2022, the industry was still dealing with the impact of […]
Russia’s invasion of Ukraine has brought war to the European continent once again. And the conflict has, inevitably, brought an increase in cyber attacks against both Ukraine and its supporters. That those attacks have not […]
Phishing poses a significant threat to all organisations, despite steps taken by security firms to counter it. Malware detection tools, and security awareness campaigns, have improved our ability to detect and block phishing attacks. Even […]
For business, 5G technology promises to replace both wired and wireless networks, inside the business and beyond. The idea of a single network technology with the speeds of a wired connection, and without some of […]
There’s said to be some 3.5 million unfilled jobs in cybersecurity. So organisations are having to look beyond their conventional methods, and talent pools, to fill vacancies. Until recently, though, little attention was paid to […]
Spending on cybersecurity seems to rise every year. One estimate, from analysts Gartner, puts global spending at $150bn. But does that spending actually protect us? And does it represent an investment, or just a sunk […]
DDoS attacks remain a threat to any organisation operating online. And over the last six to twelve months, security researchers have seen a shift in the pattern of denial of service attacks. This is being […]
Everyone — supposedly — knows about the need to use strong passwords. But convincing consumers, and firms, to use stronger passwords remains a struggle. What, then, are the password policies of the leadings websites and […]
Can we ever control cyber risks? And how do cyber risks stack up, against the other challenges facing business? Cyber threats have risen steadily over the last few years, due in part to changes in […]
Copyright © 2024 | MH Magazine WordPress Theme by MH Themes