VENDORiQ: Motorola Solutions has Acquired Australian Integrated Resilience Platform Noggin
The acquisition of Noggin by Motorola Solutions, aims to reshape the operational resilience landscape with innovative solutions.
The acquisition of Noggin by Motorola Solutions, aims to reshape the operational resilience landscape with innovative solutions.
From data breaches to identity theft, enterprise users have lost confidence in the capabilities of password managers to ensure their security given the multiple incidences of hacking. IBRS explores the relevance of these tools where the growth of threats and vulnerabilities undermine organisations’ safety.
Deciding on whether to employ a customer identity solution or to build it in-house can be a challenge for many enterprises. Organisations therefore need to consider the pros and cons of each option to achieve the goal of building security into each customer experience.
The ICTs function is susceptible to corruption risks because of its many responsibilities and touchpoints, but there is an upside – this very exposure means that ICT is uniquely placed to help defend the organisation. But the onus is on the CIO and senior ICT executives to act.
Building defences against customer data breaches requires enterprises to efficiently govern, assess, and control access to safeguard information. IBRS explores some strategies to reduce the impact of threats by adding layers of security to ensure business compliance to regulatory standards and increase customer confidence.
Recent, highly-publicised cyber incidents have made IT-related criminal acts of all types newsworthy, and severely tested the tolerance of the market (customers, regulators, and insurers) with organisations that suffer from them. As a result, organisations can no longer be satisfied with stopping or reacting to IT crime in ways that previously sufficed.
The prospect of losing personal information (PI) should terrify most organisations. But PI is essential to success. Here are several mitigation strategies.
Organisations are finally getting serious about cyber crime. But this is only one type of criminal activity, and IT departments must be equally vigilant against other types of crime.
Rather than just buying into the latest cyber security tools, many organisations can enhance their defensive posture against ransomware by adopting a few manageable operational activities