Do You Really Have a Cyber Incident Communication Strategy?
In the face of a cyber ransomware incident, effective communication is crucial. Learn how to develop a robust strategy to protect your organisation’s reputation and financial stability.
In the face of a cyber ransomware incident, effective communication is crucial. Learn how to develop a robust strategy to protect your organisation’s reputation and financial stability.
ICT executives need to establish guardrails to govern and manage the use of technology for their organisation and its stakeholders. Policies are the tool that comes immediately to mind when doing so, but they are not the only way. Use this handy IBRS model to help decide if a policy is the best solution, or whether a simpler guideline, standard or procedure could be a better fit.
As users take more control of what information they share through utilising ad blockers, disposable emails, and even limiting the data which they reveal whilst using digital services, is zero party data the best way to ensure enterprises still acquire valuable user information for marketing and other data-driven business decisions?
Zero trust is the current rallying cry for security architecture. Does that signal the death knell for firewalls?
Assurance of data integrity is the key to surviving a cyber incident. How do you increase your probability of success?
Jamf has introduced Jamf Executive Threat Protection, an advanced detection and response tool for mobile devices, to support government agencies, media and entertainment. Jamf is better known for its iOS device management solution and strong position within education. Does Jamf have what it takes to move into the end-point protection space – especially for highly sensitive organisations?
Many organisations are spending beyond their budget on cyber security technology to mitigate potential risks. However, this alone does not guarantee secure protection from attacks, since cyber criminals are becoming more sophisticated at exploiting vulnerabilities and bypassing security measures. IBRS looks into why many enterprises tend to overspend and underutilise their resources.
Are human penetration testers still necessary if the task can be automated?
No cyber security program can be successful if the executive buy-in is not secured during its initial planning stages. However, many organisations still lack top management that believes in a strong security culture – or invest the time and resources needed to establish and maintain one. What factors contribute to their shortsightedness, and what strategies can CISOs use to convince them otherwise?