In addition to having to face major and constantly evolving cyber threats, they have to comply with numerous laws and regulations
Browsing: Strategy and Planning
Economic Impact of Cybercrime estimated at $445 billion worldwide, and between 15% and 20% of the value created by the internet
we are not too naive to think that our 24/7 monitoring protocol can be accomplished simply by purchasing a SIEM system
By 2020, securing enterprise IT will require a shift to information and people-centric security strategies focused on an infrastructure’s end-points.
The survey evaluated the responses of 102 financial services organisations and 151 retail organisations in the U.K., all of which process card payments.
The concept of “IT Service Management” or ITSM may be a designation headed for extinction.
Nowhere is this seen more clearly than in the case of Article 17, the ‘right to be forgotten and to erasure’.
What if Mother Nature was the CISO? What strategy could she give the prey species so they could survive in the presence of many predators?
As Mark Kedgley, CTO, NNT asks, why are so many IT security experts intent on looking for footprints in the garden when the front door is wide open?
Partnering with a company like Regency has opened many doors for us. Providing MyID as a managed service on G-Cloud is beneficial for a number of reasons