Security

    Cyber Culture Eats Cyber Strategy for Breakfast

    IT professionals around the world have some thorough and detailed frameworks and guidelines to use when it comes to developing a robust information security strategy, but there is one thing missing – the human element.  The cyber threat landscape is out of control across the globe and organisations can’t seem to get ahead of the curve.  Cyber attacks are increasing as cybercriminals are becoming more and more sophisticated and their methods are quite frankly abhorrent.  They continue to target...

    Will Quantum computing really affect a company’s security posture?

    Since the time of Covid, no one goes to technical conferences anymore.  Since the effort of marketing hasn’t stopped, we’ve all adapted to our new normal.  As such, I’ve been participating in a number of security executive “round table” sessions over a variety of video web systems. In these typically 30-minute sessions, certain security topics are discussed amongst a group of between five and ten security professionals.  Lately, the discussions have centered around crypto key management and key protection. ...

    Re-assessing security risk during the return to work

    As businesses begin the planning process for bringing their workforces back to the office and for scaling up their operations in the wake of a global pandemic that shutdown, or at least significantly slowed, much of the economy the impact of the last two years on the potential for workplace violence and other security related risks cannot be overlooked. Over the last eighteen months the risk from criminal acts that businesses face has shifted drastically in many cities around the...

    Why Is Phishing Awareness Training Important?

    Security awareness training courses, while inherently valuable to any organization’s information security strategy, need practical support to be effective. In other words, just showing employees videos or asking them to complete quizzes isn’t enough on their own – an organization must ensure they’ve acquired the knowledge they need through simulated phishing attacks. What is Phishing Awareness Training? Phishing threats are continuously evolving to become more complex. As a result, they continue to grab international headlines, with many well-known organizations bearing the brunt...

    The Regulatory Tsunami About to Engulf IoT

    The telecoms industry has always been highly regulated. However, the introduction of 5G ushering in with it the prospect of a world of ubiquitous connectivity delivered via an explosion of internet of things (IoT) devices is expanding the focus and burden of responsibility ever wider. Even still, security budgets do not always support the very necessary changes that will bring both compliance and real-world protection. The telecom network operators have already felt the impact of additional scrutiny. Administrations across the...

    Popular

    Conceiving a Whole New Framework for Energy Consumption

    A human skill-set is loaded with value in every...

    Another Chapter in a Dangerous Crypto Trend

    While human beings are really the smartest species our...

    Finding that Next Piece for the EV Puzzle

    If there is one thing human beings know best,...

    Realizing a New Look for Your E-Commerce Experience

    While a human skill-set tends to boast many different...

    Embarking on a New Virtual Chapter

    While there are many things that help human beings...

    The proliferation of technology into law

    The early 21st Century has proved to be an...

    Why Digital Transformation May Be the Independent Retailer’s Last Best Hope

    Digital Transformation has been touching just about every industry...

    Reinventing the Social Media Game

    One thing that makes human life so special is...