Security Policy and Frameworks
Cado Security has selected a channel partner in Australia, aiming to bolster its presence in the Asia-Pacific region.
ICT executives need to establish guardrails to govern and manage the use of technology for their organisation and its stakeholders. Policies are the tool that comes immediately to mind when doing so, but they are not the only way. Use this handy IBRS model to help decide if a policy is the best solution, or whether a simpler guideline, standard or procedure could be a better fit.
As users take more control of what information they share through utilising ad blockers, disposable emails, and even limiting the data which they reveal whilst using digital services, is zero party data the best way to ensure enterprises still acquire valuable user information for marketing and other data-driven business decisions?
Is the zero trust approach losing its appeal in cyber security? Understand the missteps organisations are making with the zero trust approach.
Are human penetration testers still necessary if the task can be automated?
Recent, highly-publicised cyber incidents have made IT-related criminal acts of all types newsworthy, and severely tested the tolerance of the market (customers, regulators, and insurers) with organisations that suffer from them. As a result, organisations can no longer be satisfied with stopping or reacting to IT crime in ways that previously sufficed.