CIO Handbook Part 8 – Steps to Assure Data Integrity
Assurance of data integrity is the key to surviving a cyber incident. How do you increase your probability of success?
Assurance of data integrity is the key to surviving a cyber incident. How do you increase your probability of success?
IBRS advisor Joseph Sweeney was recently featured in an exclusive article discussing a cyber security report released by SailPoint.
What makes Tim Berners-Lee’s Solid project capable of bringing changes in the way we interact with the internet? IBRS explores how this affects control over personal information and its implications for organisations.
Jamf has introduced Jamf Executive Threat Protection, an advanced detection and response tool for mobile devices, to support government agencies, media and entertainment. Jamf is better known for its iOS device management solution and strong position within education. Does Jamf have what it takes to move into the end-point protection space – especially for highly sensitive organisations?
From data breaches to identity theft, enterprise users have lost confidence in the capabilities of password managers to ensure their security given the multiple incidences of hacking. IBRS explores the relevance of these tools where the growth of threats and vulnerabilities undermine organisations’ safety.
Is the zero trust approach losing its appeal in cyber security? Understand the missteps organisations are making with the zero trust approach.
Many organisations are spending beyond their budget on cyber security technology to mitigate potential risks. However, this alone does not guarantee secure protection from attacks, since cyber criminals are becoming more sophisticated at exploiting vulnerabilities and bypassing security measures. IBRS looks into why many enterprises tend to overspend and underutilise their resources.
Deciding on whether to employ a customer identity solution or to build it in-house can be a challenge for many enterprises. Organisations therefore need to consider the pros and cons of each option to achieve the goal of building security into each customer experience.
Customer experience is never complete without a solid security strategy. Unknown to most enterprises, the linear path of a customer journey necessitates an equal security approach in each interaction to establish trust in the relationship between the brand and the consumer. IBRS explores what solutions an enterprise must invest in to secure each stage of the journey.