Technology Magazine | Industry | News | Success Stories
Security
IC Insights
Cyber Culture Eats Cyber Strategy for Breakfast
IT professionals around the world have some thorough and detailed frameworks and guidelines to use when it comes to developing a robust information security strategy, but there is one thing missing – the human element. The cyber threat landscape is out of control across the globe and organisations can’t seem to get ahead of the curve. Cyber attacks are increasing as cybercriminals are becoming more and more sophisticated and their methods are quite frankly abhorrent. They continue to target...
IC Insights
Will Quantum computing really affect a company’s security posture?
Since the time of Covid, no one goes to technical conferences anymore. Since the effort of marketing hasn’t stopped, we’ve all adapted to our new normal. As such, I’ve been participating in a number of security executive “round table” sessions over a variety of video web systems. In these typically 30-minute sessions, certain security topics are discussed amongst a group of between five and ten security professionals. Lately, the discussions have centered around crypto key management and key protection. ...
IC Insights
Re-assessing security risk during the return to work
As businesses begin the planning process for bringing their workforces back to the office and for scaling up their operations in the wake of a global pandemic that shutdown, or at least significantly slowed, much of the economy the impact of the last two years on the potential for workplace violence and other security related risks cannot be overlooked.
Over the last eighteen months the risk from criminal acts that businesses face has shifted drastically in many cities around the...
IC Insights
Why Is Phishing Awareness Training Important?
Security awareness training courses, while inherently valuable to any organization’s information security strategy, need practical support to be effective. In other words, just showing employees videos or asking them to complete quizzes isn’t enough on their own – an organization must ensure they’ve acquired the knowledge they need through simulated phishing attacks.
What is Phishing Awareness Training?
Phishing threats are continuously evolving to become more complex. As a result, they continue to grab international headlines, with many well-known organizations bearing the brunt...
IC Insights
The Regulatory Tsunami About to Engulf IoT
The telecoms industry has always been highly regulated. However, the introduction of 5G ushering in with it the prospect of a world of ubiquitous connectivity delivered via an explosion of internet of things (IoT) devices is expanding the focus and burden of responsibility ever wider. Even still, security budgets do not always support the very necessary changes that will bring both compliance and real-world protection.
The telecom network operators have already felt the impact of additional scrutiny. Administrations across the...
Popular
Conceiving a Whole New Framework for Energy Consumption
A human skill-set is loaded with value in every...
Another Chapter in a Dangerous Crypto Trend
While human beings are really the smartest species our...
Realizing a New Look for Your E-Commerce Experience
While a human skill-set tends to boast many different...
LogRocket Raises $25 Million in Series C Financing; Plans on Improving R&D Efforts and Bolster Workforce
A human life, as we know, tends to have...
Wonder Raises $350 Million in Series B Financing; Plans on Launching More Restaurants and Fuelling Expansion
If we sit down and assess all the human...
Why Digital Transformation May Be the Independent Retailer’s Last Best Hope
Digital Transformation has been touching just about every industry...