Disaster Recovery Strategy for the Cloud – Webinar and Presentation Kit
The Cloud may have high-availability, and play a role in most organisations’ business continuity plans, but it also demands its own disaster recovery strategy.
The Cloud may have high-availability, and play a role in most organisations’ business continuity plans, but it also demands its own disaster recovery strategy.
Rather than just buying into the latest cyber security tools, many organisations can enhance their defensive posture against ransomware by adopting a few manageable operational activities
In the aftermath of the Optus breach, organisations are likely to see increased regulation and penalties in cases where private information in their possession has not been adequately protected.
As many enterprises recognise the advantages of biometric authentication over traditional call centre verification methods, biometric voice recognition is increasing in popularity as a secondary source of identification due to its speed and user-friendliness.
Digital customer convenience remains a top priority among users even if consumers acknowledge the necessity of defending their personal information against malicious actors. How have customer perceptions evolved to what they are today, and what can be done to influence better identity and access management practices among enterprises?
Microsoft Purview is now a catch-all package for data protection, governance and information management (sort of.) IBRS explores what’s new and what it means for data teams and information managers.
During Microsoft Ignite 2022, the company unveiled new premium products and services, including additional security features and a repacking of its compliance features in the nebulous Purview offering. IBRS discusses Microsoft’s claims it is the world’s largest security vendor.
The Australian Cyber Security Centre (ACSC) requests IT buyers to review the authenticity and integrity of their purchases. IBRS looks into the relevance of such guidance.
You are investing in cyber security, but are you tracking your efforts with metrics and KPIs?