Cyber Security
Browse Categories and Tags
Drive successful knowledge management, collaboration and cyber security programs with IBRS whiteboard sessions.
How we authenticate ourselves online is of paramount importance. Traditionally, passwords have been the go-to method, serving as a unique identifier to confirm one’s identity. However, the landscape of authentication has witnessed significant evolution, largely driven by vulnerabilities associated with password-based systems.
ABC News recently highlighted a concerning development, shedding light on the activities of the Russian ransomware group AlphV. This underscores the ever evolving threat of ransomware attacks and the importance of staying vigilant in the face of such cyber threats.
On the 9th of March 2023, IBRS moderated an in-depth peer roundtable on the challenges and future of fraud detection. The session was conducted as part of the Australian Cyber Security Leadership Summit and sponsored by Confluent. The session was attended by senior cyber security and fraud specialists from Australia’s top enterprises and conducted under Chatham House rule. Following is a summary of the key observations discussed and recommendations shared by the participants.
ICT executives need to establish guardrails to govern and manage the use of technology for their organisation and its stakeholders. Policies are the tool that comes immediately to mind when doing so, but they are not the only way. Use this handy IBRS model to help decide if a policy is the best solution, or whether a simpler guideline, standard or procedure could be a better fit.
YubiKeys remains a highly effective and secure form of authentication and is now being used by the Austrian government. Will this influence other countries to follow suit?
Completing a business impact analysis (BIA) will provide CIOs with an idea of what data supports specific processes. Discover the approach to providing a physical framework to assist in developing a BIA.
IBRS advisor Joseph Sweeney was recently featured in an exclusive article discussing a cyber security report released by SailPoint.