Security Readiness

Cyber Security Spending Does Not Always Equate to Better Protection

Many organisations are spending beyond their budget on cyber security technology to mitigate potential risks. However, this alone does not guarantee secure protection from attacks, since cyber criminals are becoming more sophisticated at exploiting vulnerabilities and bypassing security measures. IBRS looks into why many enterprises tend to overspend and underutilise their resources.

Read More »

Wicked Game: How to Secure Senior Executives’ Cyber Security Buy-In

No cyber security program can be successful if the executive buy-in is not secured during its initial planning stages. However, many organisations still lack top management that believes in a strong security culture – or invest the time and resources needed to establish and maintain one. What factors contribute to their shortsightedness, and what strategies can CISOs use to convince them otherwise?

Read More »

Corruption Prevention and Response

Recent, highly-publicised cyber incidents have made IT-related criminal acts of all types newsworthy, and severely tested the tolerance of the market (customers, regulators, and insurers) with organisations that suffer from them. As a result, organisations can no longer be satisfied with stopping or reacting to IT crime in ways that previously sufficed.

Read More »
data center

Should Data be Masked?

The prospect of losing personal information (PI) should terrify most organisations. But PI is essential to success. Here are several mitigation strategies.

Read More »
Security

Not All Technology Crime is Cyber

Organisations are finally getting serious about cyber crime. But this is only one type of criminal activity, and IT departments must be equally vigilant against other types of crime.

Read More »

Search