For any organisation above a certain size, effective and efficient protection can only result from the layered application of protective measures at people, process and technology level. And in that order.
Category: Information Security
Taking a pure operational approach to cyber security fails because it downgrades a complex matter and negates its true dimension. It is not – and has never been – a purely technical problem.
Contributor and Transformation Officer Shaun Taylor shares his experience from a recent transformation project which required rapid outcomes. Find out which principles helped them deliver change amid a myriad of challenges.
Expert Contributor and cybersecurity specialist Jean-Christophe Gaillard highlights the instability of the current security landscape. Specifically, he delves into why cutting security spending to the ground in the midst of the COVID-19 crisis would be disastrous.
Red teaming exercises help organisations to improve their security posture by using adversarial techniques to pinpoint weaknesses.
While this is better than doing nothing or relying blindly on the security of cloud providers, those externalised, part-time services – often delivered remotely – are rarely the magic bullet they pretend to be…