Jan 25, 2023 Insider threats: Practical steps to prevent a costly breach By James Habben The term “insider threat” is commonly used within the cyber security and information security industries, referring to a risk posed by...
Jan 10, 2023 Cybersecurity Trends for 2023: How to protect your organization from attackers in a recessive economy By Megha Kalsi Nate Morin David Stanton Doing more with less: It's the new shift for cybersecurity. Driven by a looming recession and increased management scrutiny around...
Jan 03, 2023 Three winning strategies to combat the ever-increasing sophistication of cybercriminals By Lukas Weber Tim Roberts In the age of rapid technological evolution, cybercriminals have been one of the many benefactors of novel technology, capitalising on...
Nov 14, 2022 Digital Trust in Manufacturing – here comes the Chief Product Security Officer By Ismail Mohammed Business leaders often view cybersecurity as a specialized IT role when in reality, it is a subset of enterprise and business risk...
Nov 07, 2022 Mehr als nur Technik: Was Organisationen tun können, um ihre Verwundbarkeit für Cyber-Angriffe zu reduzieren By Daniel Weyh Wie so oft im Leben ist es bei Cyber-Security so, dass Vorbereitung essenziell ist, um einerseits Eintrittswahrscheinlichkeit und...
Oct 20, 2022 Industry 4.0: Seek the reward, mind the risks By Sudeep Saxena Allen Merriman Les Viszlai Thilo Wallenstein Pablo Wangermann Antonio Perez Senande Gary Tong +4 more... Show less Industry 4.0 offers great promise, but with this promise comes risk. A host of cybersecurity vulnerabilities require careful attention....
Sep 20, 2022 How to count the cost of cyber risk to drive competitive advantage By Roger Auinger Cyber risk are trigger words for individuals and corporations alike – from a mental check-up on personal password quality to anxiety over...
Sep 02, 2022 Misery Loves Company By Joseph Freeh Sean Kearney How can understanding the current U.S. economic environment enhance cybersecurity risk visibility? Since the 1940s, the Misery Index has...
Aug 30, 2022 Breaches may be inevitable, but the way organisations respond is what really matters. By Edd Hardy As cyber consultants, we often say that breaches are inevitable, it's not if but when, and that having pre-written and tested plans will...
Aug 23, 2022 Cyber Healthcare Series: Three imperatives that should define your medical device security strategy By Beth Musumeci Stanley Awenlimobor Leo Berrun Forty million – this is the stark number of individuals impacted by reported cybersecurity breaches from 697 healthcare entities between...
Jun 23, 2022 The business case for building a Virtual Power Plant - and 5 IT watchouts if you do… By Les Viszlai I wrote in my previous article about the Energy Cloud and the benefits offered by Distributed Energy Resources (DERs) and Virtual Power...
Jun 09, 2022 Why the price of fish threatens your cybersecurity By Martin Simpson Alongside the war in Ukraine, the cost of living crisis dominates world headlines. While there has been plenty of attention on the...
May 31, 2022 Increasing Your ESG Rating with Cloud By Megha Kalsi Environmental, social, and governance (ESG) scores are top of mind for most executives today. Organizations want to be known as...
May 31, 2022 Terra firma? The collapse of TerraUSD raises questions about the future of stablecoins By Colin Johnson Kevin Madura Earlier this month, TerraUSD, a type of cryptocurrency known as a “stablecoin”, crashed. This isn’t “supposed” to happen – stablecoins...
May 03, 2022 A bridge too far? Largest ever crypto hack highlights the impact on users and the lack of protection at the cutting edge By Colin Johnson Kevin Madura On 29 March, what may be the largest crypto hack to date was detected, with an estimated $625m of cryptocurrency stolen from the “Ronin...
Apr 20, 2022 The business case for building a Virtual Power Plant - and 5 IT watch outs if you do… By Les Viszlai I wrote in my previous article about the Energy Cloud and the benefits offered by Distributed Energy Resources (DERs) and Virtual Power...