Security Round-up: Five Things We’ve Learned in 2017
Credit to Author: Trend Micro| Date: Wed, 27 Dec 2017 14:00:04 +0000
The past 12 months have been packed with geopolitical incidents, global malware threats and ubiquitous big-name data breaches. From the CIA Vault7 and NSA Shadow Brokers leaks at the start of the year, to the WannaCry and NotPetya ‘ransomware’ campaigns, and Uber’s shocking revelations just last month, there’s been plenty for UK CISOs to ruminate…
In the 2000 movie High Fidelity, the concept of making lists is a dominant focus. What are your top five favorite records? Top five side one, track ones? Top five dream jobs? In the movie, Rob Gordon, portrayed by John Cusack, decides to categorize his top five most memorable breakups in order to determine why…
Last week you may have seen some worrying news: researchers probing the darkest corners of the underground web found a secret trove containing 1.4 billion breached usernames and passwords. Yes, that’s right: 1.4 BILLION. Yours might very well be among them, and if you reuse the same password across numerous accounts, they may all now…
Chances are, your kids have never known a world when the internet wasn’t there—which is both good and bad news. On the one hand, it means these digital natives take to the online world much quicker than you or I ever did. On the other, it also means they’re less likely to question what they…
Our list may not have quite the jingle of the holiday carol favorite, but keeping these threats in mind can help IT and business leaders position their company for protection and success heading into 2018.
Lean Manufacturing brings significant benefits to industry, including cost reduction, quality improvement, reduced cycle time, and greater customer satisfaction (See “The Machine that Changed the World”, Womak, J., Jones, D., and Roos, D., Free, Press, 1990 for the groundbreaking analysis of Toyota’s Lean Production). Can Information Technology organizations apply Lean to cybersecurity? The core challenge…
As businesses work to attract talent, they must still be able to maintain their security stance and protect the organization’s IT and data assets from prying, malicious actors.