risk

The Dynamic Duo – Why Modern Businesses Need the CIO and CISO to Collaborate

For any cybersecurity or data protection strategy to succeed, organisations need to rely on strong internal collaboration and communication processes. In particular, the CIO/CISO dynamic can have a significant impact on both short- and long-term decision making, from strategic investment decisions to leading the response to security incidents.

Free Membership Required

You must be a Free member to access this content.

Join Now

Already a member? Log in here
Read more...

IAM in a shifting environment

The fourth annual Identity Management Day (April 9) brought the opportunity to assess and evaluate the shifting environment plaguing Identity and Access Management (IAM).

Identity plays a pivotal role in all facets of business functions. Overseeing identity and access presents challenges in determining who should have access to what.
This process requires a contextual understanding of the roles and duties of numerous individuals within an organization, ranging from system owners and supervisors to IT, security, and compliance personnel. Managing access between all these stakeholders and decision-makers while mitigating human error, minimizing excessive permissions, and preventing inappropriate access configurations presents a formidable task.

As workforces evolve, managing access privileges becomes even more complex, raising the risk of insider threats and unauthorized access. Understanding identity management is crucial across all business activities, especially with the rise of hybrid and remote work setups.

A strong IAM strategy requires enterprises to maintain a centralized and consistent view of all devices, resources, data, and users, along with timely provisioning of access to different users. When any of these elements are insufficiently operated, both the level of cybersecurity and the quality of user experience are jeopardized.

Read more...

Why your data isn’t as safe as you think and what it could cost you

We’ve all been guilty of not backing up important files, only learning our lesson after losing family photos, documents or homework. But for businesses, not backing up data can be a costly mistake.

Purchase Required

This content requires that you purchase additional access. The price is $1.00 or free for our Premium members.

Purchase this Content ($1.00) Choose a Membership Level

Already a member? Log in here
Read more...

GDPR and the need for Cyber Insurance in Europe

GDPR, with its rigorous data protection standards and hefty fines for non-compliance, has heightened awareness about data privacy and reshaped the demand for cyber insurance.

Cyber insurance offers a financial safety net that can help organisations mitigate the potentially devastating financial impacts of cyber incidents, including data breaches, ransomware attacks, and other forms of cybercrime.

Organisations should consider cyber insurance as an integral component of their risk management strategy, particularly given the escalating landscape of cyber threats and regulatory requirements.

Membership Required

You must be a member to access this content.

View Membership Levels

Already a member? Log in here
Read more...

Data Security Posture Management (DSPM) Explained

In 2022 Gartner (who else?) coined a new term: Data Security Posture Management (DSPM), a new, data-centric approach that gives security teams full visibility into cloud environments. Through DSPM, security teams can focus on securing the "crown jewels" of their data.

Purchase Required

This content requires that you purchase additional access. The price is $1.00 or free for our Premium members.

Purchase this Content ($1.00) Choose a Membership Level

Already a member? Log in here
Read more...

Like Digital Cicadas, Cybercriminals Lie In Wait Before Unleashing Their Presence

A curious parallel can be drawn between cybercriminals and the intriguing phenomenon of Cicadas. Akin to the periodic insects that emerge from the ground after years of dormancy, cybercriminals often resurface with renewed vigor, unleashing their disruptive activities on unsuspecting organizations.

Purchase Required

This content requires that you purchase additional access. The price is $1.00 or free for our Premium members.

Purchase this Content ($1.00) Choose a Membership Level

Already a member? Log in here
Read more...