Category: Information Security

Risk Management

Risk – Abstract concept or Valuable asset

Risk is the potential of gaining or losing something of value. There are two parts to that statement, firstly potential, and the second, value. Sounds simple. And to translate these two components into something that actually means something, these abstract terms need to be made real. They need to resonate with each pair of eyes and ears.

IoT

The Internet Of Things (IoT) Has Arrived – What You Should Know

We have entered a new era of scientific breakthroughs and technological applications that will change life as we know it. Accelerated technological development is transforming our civilization. The pace of innovation is growing so rapidly that it is becoming exponential as each year passes.

Futurist Dr. Michio Kaku characterizes this blazing technological shift as moving from the “age of discovery” to the “age of mastery.”

This next decade beckons many new technological discoveries and applications. This includes genetic engineering and regeneration of body parts, new cures for diseases, artificial intelligence, augmented reality, nano-technologies, robotics, ultra-high speed trains and self-driving cars, renewable energies, sustainable agriculture, big data, 3-D Printing, digital security, quantum computing, mobility, and paper-thin flexible personal computers.

Cloud Computing

Box gives its customers ‘regions to be cheerful’

The Box World Tour rolled into London again this week, and I was there to see how the company’s enterprise march continues across Europe – and how it’s being received by the crowd in suits who came along to listen.

Some of the announcements made at the London edition of the Box World Tour can be traced back to teasers and trailers at last year’s BoxWorks. For example, KeySafe is the more marketing-friendly name for the company’s Encryption Key Management service. It now includes a software version (via AWS Key Management Service) alongside the existing AWS Hardware Service Module it launched with, making it more attractive to smaller organisations for whom a hardware appliance wasn’t a cost-effective option.

Adopting A Cooperative Global Cyber Security Framework To Mitigate Cyber Threats (Before It Is Too Late)

SecurityFeatureThe recent OPM cyber breach at the U.S. Government’s Office of Personnel Management (OPM) provided a wakeup call to the seriousness and sophistication of the cyber security threat aimed at both the public and private sectors. The fact is that over 43% of companies had breaches last year (including mega companies such as Home Depot, JPMorgan, and Target. Moreover, the intrusion threats are not diminishing. For example, British Petroleum (BP) faces 50,000 attempts at cyber intrusion every day.