Contributor and Transformation Officer Shaun Taylor shares his experience from a recent transformation project which required rapid outcomes. Find out which principles helped them deliver change amid a myriad of challenges.
Expert Contributor and cybersecurity specialist Jean-Christophe Gaillard highlights the instability of the current security landscape. Specifically, he delves into why cutting security spending to the ground in the midst of the COVID-19 crisis would be disastrous.
by Fran Howarth · Published 3rd July 2020 · Last modified 4th July 2020
While this is better than doing nothing or relying blindly on the security of cloud providers, those externalised, part-time services – often delivered remotely – are rarely the magic bullet they pretend to be…
The ability to infiltrate networks and remain undetected is a key capability for attackers to gain access to systems, hence the need for threat hunting.
It does not make sense to oppose maturity-based approaches and risk-based approaches to cyber security: They are just different ways of managing, driving and measuring action around cyber security in different situations and different firms. One does not have to be superior to the other.
We use cookies to ensure that we give you the best experience on our website and to allow us to understand the topics of most interest to our members and readers. Privacy policyAllowRefuse