CIO Handbook Part 8 – Steps to Assure Data Integrity
Assurance of data integrity is the key to surviving a cyber incident. How do you increase your probability of success?
Assurance of data integrity is the key to surviving a cyber incident. How do you increase your probability of success?
Jamf has introduced Jamf Executive Threat Protection, an advanced detection and response tool for mobile devices, to support government agencies, media and entertainment. Jamf is better known for its iOS device management solution and strong position within education. Does Jamf have what it takes to move into the end-point protection space – especially for highly sensitive organisations?
Many organisations are spending beyond their budget on cyber security technology to mitigate potential risks. However, this alone does not guarantee secure protection from attacks, since cyber criminals are becoming more sophisticated at exploiting vulnerabilities and bypassing security measures. IBRS looks into why many enterprises tend to overspend and underutilise their resources.
Are human penetration testers still necessary if the task can be automated?
The ICTs function is susceptible to corruption risks because of its many responsibilities and touchpoints, but there is an upside – this very exposure means that ICT is uniquely placed to help defend the organisation. But the onus is on the CIO and senior ICT executives to act.
No cyber security program can be successful if the executive buy-in is not secured during its initial planning stages. However, many organisations still lack top management that believes in a strong security culture – or invest the time and resources needed to establish and maintain one. What factors contribute to their shortsightedness, and what strategies can CISOs use to convince them otherwise?
Recent, highly-publicised cyber incidents have made IT-related criminal acts of all types newsworthy, and severely tested the tolerance of the market (customers, regulators, and insurers) with organisations that suffer from them. As a result, organisations can no longer be satisfied with stopping or reacting to IT crime in ways that previously sufficed.
Does the LastPass breach signal the end for password managers?
The prospect of losing personal information (PI) should terrify most organisations. But PI is essential to success. Here are several mitigation strategies.