by Shlom | Jun 12, 2017 | Uncategorized
Introduction Fear drives the cybersecurity initiatives deployed by most organizations, but that means spending lots of money and resources trying to achieve something where failure is the only outcome. It is simply not possible to completely prevent hackers getting...
by Shlom | Jun 12, 2017 | IOT technology
Introduction For many years security experts have preached that cybersecurity needs a risk based approach. According to a new survey it appears organizations are now taking active heed of that advice, with more and more adopting risk based strategies. This is driven...
by Shlom | Jun 12, 2017 | Uncategorized
Introduction Most organizations have an attack surface that is constantly expanding. Those that have a security policy aimed only at preventing intruders at the perimeter are doomed to failure. The highest levels of security should be applied only to the most valuable...
by Shlom | Jun 12, 2017 | Uncategorized
One of the hot topics last year, and undoubtedly this year too, is cyber insurance. Is this the panacea that information security has been waiting for? Cyber insurance is intended to mitigate the loss from any information security incidents. Once a company has...
by Shlom | Jun 12, 2017 | Big data
BI systems are undoubtedly complex and costly to set up. As such, many projects are not completed as planned and are often irrelevant quickly afterwards. Many organizations will even take the step of telling you they have no BI – in spite of the multi-million dollar...