Tagged: CyberSecurity

Data Exfiltration: Do you know where your data is?

Intellectual and industrial property, personal data, bank data, providers and client directories, personal communications.. Nowadays, data is one of the most important assets in our organizations and even in our...


Cyber Security: The Lost Decade

New Book and Must-Read from JC Gaillard > How to Transform Cyber Security > This is a compilation of the best cyber security management, organisation and governance articles published on the Corix Partners blog between 2015 and 2017. They offer a truly alternative view on how to organise and manage security in large firms, inspired by the direct field experience of their author JC Gaillard, former CISO and leading consultant and expert on the topic. 35 easy to read, bitesize articles which cover all key managerial aspects around information security, from the reporting line of the CISO to the role of the Board, and how to make it work in real life.

Insights: Cyber Security

One of the popular topic today in the digital world aside from Blockchain is Security. The EQUIFAX incident is just a good reminder for all of us that everyone is...

Left Menu Icon