Information security based on risk not fear

Information security based on risk not fear

Introduction Fear drives the cybersecurity initiatives deployed by most organizations, but that means spending lots of money and resources trying to achieve something where failure is the only outcome. It is simply not possible to completely prevent hackers getting...
Experts Now Adopt a Riskbased Framework

Experts Now Adopt a Riskbased Framework

Introduction For many years security experts have preached that cybersecurity needs a risk based approach. According to a new survey it appears organizations are now taking active heed of that advice, with more and more adopting risk based strategies. This is driven...
Targeted Controls Key to Effective Security

Targeted Controls Key to Effective Security

Introduction Most organizations have an attack surface that is constantly expanding. Those that have a security policy aimed only at preventing intruders at the perimeter are doomed to failure. The highest levels of security should be applied only to the most valuable...
Managing Risk with Cyber Insurance

Managing Risk with Cyber Insurance

One of the hot topics last year, and undoubtedly this year too, is cyber insurance. Is this the panacea that information security has been waiting for? Cyber insurance is intended to mitigate the loss from any information security incidents. Once a company has...
Traditional BI Losing Out to Modern BI

Traditional BI Losing Out to Modern BI

BI systems are undoubtedly complex and costly to set up. As such, many projects are not completed as planned and are often irrelevant quickly afterwards. Many organizations will even take the step of telling you they have no BI – in spite of the multi-million dollar...