Turning the Tables on Cyber Security Budgets
Time to move away from bottom-up dynamics: The Board should decide on priorities and drive the discussion As we hit budget time again in many large organisations, it is still amazing to see the...
Time to move away from bottom-up dynamics: The Board should decide on priorities and drive the discussion As we hit budget time again in many large organisations, it is still amazing to see the...
Security culture and governance eat tech for breakfast Looking back at what happened at ground level throughout the COVID crisis, it is clear that the focus has been entirely on operational matters: From moving...
Data is the new oil of business and managing, protecting and securing it in an effective manner is critical to us all. 2020 has changed this game with more dispersed data & and increased threat landscape.
The security of any IoT product should be seen as a functionality, not an add-on, and treated as an inherent component of any use case. Basic security good practices will vary depending on the usage of the product but should be part of any MVP.
How do you know who a person is online? How do you authenticate the person buying a product from you is the person associated with a credit card? As business increasingly moves online, and...
As the value of bitcoin increases,. so does the temptation for people to use your hardware and electricity to ‘mine’ this currency. Can you be sure that this isn’t happening to you, from external or even internal sources?