Cyber Security

Corruption Prevention and Response

Recent, highly-publicised cyber incidents have made IT-related criminal acts of all types newsworthy, and severely tested the tolerance of the market (customers, regulators, and insurers) with organisations that suffer from them. As a result, organisations can no longer be satisfied with stopping or reacting to IT crime in ways that previously sufficed.

Read More »
data center

Should Data be Masked?

The prospect of losing personal information (PI) should terrify most organisations. But PI is essential to success. Here are several mitigation strategies.

Read More »
Cyber Security Access Control

An Executive’s Guide to Identity and Access Management. An IBRS Special Report

The limited exposure of non-technical staff to the basics of identity and access management (IAM) can result in serious consequences for the organisation’s exposure to security breaches. This guide aims to bridge the knowledge gap in best practices for enterprises that need to develop a business case for IAM, and to realise its organisation-wide impacts.

Read More »

Search