Technology and cyber crime: how to keep out the bad guys

Maintaining strict security protocols and monitoring your firm’s digital activity can improve your chances of fending off an attack

Technology and cyber crime: how to keep out the bad guys (ft.com)

5 Key Legal Issues for CIOs in 2024

We live in a litigious society. And, while there is a general feeling among CIOs that they are protected from legal actions by their companies’ liability policies, that’s not always the case.

5 Key Legal Issues for CIOs in 2024 (informationweek.com)

Reduce security risk with 3 edge-securing steps

A cybersecurity leader’s role in reducing risk should always be clearly defined, but all too often in our business, it seems we’re not doing enough

Reduce security risk with 3 edge-securing steps | CSO Online

Identity security is everything when it comes to using AI

Identity and access management is the first line of defense against misuse of AI, both inside and outside their organizations. Ninety percent of the executives surveyed deemed the use of IAM when implementing and managing AI as “important,” “moderately important” or “very important.”

Identity security is everything when it comes to using AI | SC Media (scmagazine.com)

To guard against cyberattacks in space, researchers ask ‘what if?’

If space systems such as GPS were hacked and knocked offline, much of the world would instantly be returned to the communications and navigation technologies of the 1950s. Yet space cybersecurity is largely invisible to the public at a time of heightened geopolitical tensions.

To guard against cyberattacks in space, researchers ask ‘what if?’ (theconversation.com)

Cyber Essentials at 10: Success or failure?

In the broadest possible terms, Cyber Essentials has been successful. This is because it has helped many organisations get cyber security basics in place.

Cyber Essentials at 10: Success or failure? | Computer Weekly

Thinking About Security, Fast & Slow

Managing risk involves long-term planning and short-term response to fast-changing parameters.

Thinking About Security, Fast & Slow (darkreading.com)

SaaS Cybersecurity: Threats And Mitigation Strategies

As businesses build stronger walls around their SaaS infrastructure, threat actors also use more sophisticated attack methods. The list of risks below is not comprehensive, but it contains the most urgent threats today, both familiar and emerging.

SaaS Cybersecurity: Threats And Mitigation Strategies (forbes.com)

Cybersecurity Frameworks: What Do the Experts Have to Say?

If you’re considering implementing a cybersecurity framework, you’re likely questioning which one to choose. This is the first and most crucial stage of your implementation journey.

Cybersecurity Frameworks: What Do the Experts Have to Say? | Tripwire

Nobody wants a leak: Getting cyber secure in manufacturing

Manufacturing businesses are advancing their stacks, but openings have sprung for bad actors. How can businesses kick the bucket on cyber risks?  

Nobody wants a leak: Getting cyber secure in manufacturing (erp.today)

 

Share: