by Shlom | Jun 12, 2017 | Uncategorized
More and more businesses realize the value of data visualizations and there are now many predictions for the future of the meteoric rise of the information dashboard. The past couple of years have seen huge movement in the industry, and with more and more businesses...
by Shlom | Jun 12, 2017 | Uncategorized
Since 2014, massive data breaches have become a common feature of the news. The huge amount of money at stake – Sony’s was $100 million, Target’s about $110 million – means that more and more companies are taking their information security seriously. This...
by Shlom | Jun 12, 2017 | Uncategorized
Introduction In the past, developing a cybersecurity policy and strategy for an organization involved digesting multiple standards, regulations and assessments. This usually meant deciding on competing priorities with the resulting strategy being compliance based....
by Shlom | Jun 12, 2017 | Uncategorized
Introduction Fear drives the cybersecurity initiatives deployed by most organizations, but that means spending lots of money and resources trying to achieve something where failure is the only outcome. It is simply not possible to completely prevent hackers getting...
by Shlom | Jun 12, 2017 | Uncategorized
Introduction Most organizations have an attack surface that is constantly expanding. Those that have a security policy aimed only at preventing intruders at the perimeter are doomed to failure. The highest levels of security should be applied only to the most valuable...
by Shlom | Jun 12, 2017 | Uncategorized
One of the hot topics last year, and undoubtedly this year too, is cyber insurance. Is this the panacea that information security has been waiting for? Cyber insurance is intended to mitigate the loss from any information security incidents. Once a company has...