Whiteboard Sessions: Knowledge Management, Collaboration and Cyber Security
Drive successful knowledge management, collaboration and cyber security programs with IBRS whiteboard sessions.
Drive successful knowledge management, collaboration and cyber security programs with IBRS whiteboard sessions.
How we authenticate ourselves online is of paramount importance. Traditionally, passwords have been the go-to method, serving as a unique identifier to confirm one’s identity. However, the landscape of authentication has witnessed significant evolution, largely driven by vulnerabilities associated with password-based systems.
ABC News recently highlighted a concerning development, shedding light on the activities of the Russian ransomware group AlphV. This underscores the ever evolving threat of ransomware attacks and the importance of staying vigilant in the face of such cyber threats.
On the 9th of March 2023, IBRS moderated an in-depth peer roundtable on the challenges and future of fraud detection. The session was conducted as part of the Australian Cyber Security Leadership Summit and sponsored by Confluent. The session was attended by senior cyber security and fraud specialists from Australia’s top enterprises and conducted under Chatham House rule. Following is a summary of the key observations discussed and recommendations shared by the participants.
YubiKeys remains a highly effective and secure form of authentication and is now being used by the Austrian government. Will this influence other countries to follow suit?
Completing a business impact analysis (BIA) will provide CIOs with an idea of what data supports specific processes. Discover the approach to providing a physical framework to assist in developing a BIA.
IBRS advisor Joseph Sweeney was recently featured in an exclusive article discussing a cyber security report released by SailPoint.
Omniscien Technologies is a Singapore-based, enterprise-class, neural machine translation, voice recognition, and language processing technology solutions vendor specialising in AI-based automation technologies, and language processing with the goal of augmenting human intelligence via artificial intelligence. Get to know more about the company’s products and services in this vendor feature.
Jamf has introduced Jamf Executive Threat Protection, an advanced detection and response tool for mobile devices, to support government agencies, media and entertainment. Jamf is better known for its iOS device management solution and strong position within education. Does Jamf have what it takes to move into the end-point protection space – especially for highly sensitive organisations?