Português - Portugal
How ransomware runs the underground economy
Ransomware gangs are adopting all the core elements of legitimate businesses—including defined staff roles, marketing plans, partner ecosystems, and even venture capital investments—and some hallmarks of more traditional criminal enterprises.
Managing Data Privacy Controls for Hybrid and Multi-Cloud Deployments
29 August, 07:03
Complexity of data privacy compliance is significantly increased by growing cloud adoption rates. A delegated governance model based on a centralized platform with decentralized policy implementation overcomes these difficulties.
Is data privacy a thing of the past in a digital world?
26 August, 07:50
Views about data privacy vary depending on where people live, including what protective actions individuals can take. What's needed is meaningful consent.
The Future Of Cybersecurity Insurance: Policies That Follow The Risk
22 August, 07:33
Seeking a cyber insurance policy that is right for your organization can be a daunting task, but it doesn’t have to be if you know what practical elements to look for before making a decision.
7 key data points on the cybersecurity skills shortage
21 August, 06:39
The global cybersecurity skills shortage is as bad as it has ever been, and most organizations are feeling the pinch, new research finds. But cybersecurity professionals have many recommendations for addressing this situation.
Ransomware and Returning to the Basics of Cybersecurity
19 August, 06:59
Far from sensationalizing ransomware attacks, our response should be to return to the basics of cybersecurity. This requires a converged IT-OT security strategy to limit damage and protect valuable assets.
How to improve COVID-19 supply chain cybersecurity
17 August, 07:13
Headlines warn about attempts to exploit gaps in key pharma supply chain cybersecurity. Here's how CISOs can respond.
While IT budget allocations for cybersecurity are significant, data breaches still very common
14 August, 07:22
IT decision makers are struggling with the current combination of IT staffing/security solutions ability to effectively stop cyberattacks.
May ransomware blight all the cyber stragglers and let God sort them out
12 August, 07:38
After decades of cyber wake-up calls, maybe the time has come for cyber Darwinism to provoke survival of the cyber fittest -- although we could also follow new policy recommendations.
4 best practices for big data security in cloud computing
10 August, 07:13
Handle big data security in cloud computing with these four best practices: proper architecture design, encryption, monitoring and least privilege tactics.
Cyber Security: A Top-down Imperative for Schools
9 August, 06:59
JC Gaillard talks to Glaucia Rosas from the Edutec Alliance on how school leaders need to approach cyber security in the wake of the COVID pandemic.
How to avoid cybersecurity headaches in a hybrid workplace
8 August, 07:09
As companies move to hybrid workplace models, cybercriminals are taking note. Here are best practices for reducing risks.
Why businesses must stop paying the ransom
31 August, 06:48
Ransomware payments drive this criminal industry but stopping them is no simple matter
How cloud-native is changing the role of the CISO
28 August, 07:21
Here's why CISOs need to embrace cloud-native, get to know its advantages, and understand the change it introduces to security practices.
Why automated pentesting won't fix the cybersecurity skills gap
24 August, 07:17
The cybersecurity skills gap is a people problem, but it's not just about finding enough people to operate tools, the tools won't fix it.
Recent shadow IT related incidents present lessons to CISOs
22 August, 06:58
Employee use of unauthorized applications and services have resulted in high-profile data losses and exposure. CISOs need to understand why shadow IT exists before they can address it.
What to expect for cybersecurity investment as we emerge from the pandemic
20 August, 07:02
Cybersecurity is a red-hot sector, and venture capital firms are looking at the market and trying to predict what's in store for the future.
The Role Of A CISO In Building A Modern Cybersecurity Culture
18 August, 06:54
The role of a CISO is changing as the cybersecurity landscape becomes more technical and complex with the ever-evolving intricacies of threats.
A Cybersecurity Stop Sign: CISA Introduces Bad Practices
15 August, 07:23
At its crux, CISA’s Bad Practices are the cyber equivalent of leaving your keys in the ignition when you park your car.
Attacks against industrial networks will become a bigger problem. We need to fix security now
13 August, 07:30
There's very few opportunities in cybersecurity where you get the benefit of foresight. This could be one.
7 ways technical debt increases security risk
12 August, 07:32
Shoddily developed and deployed projects can leave your enterprise vulnerable to attacks. Here's how to stop technical debt from sending your organization to the cyber-poorhouse.
‘Cybersecurity today requires greater digital and business understanding’
9 August, 07:15
BSI’s Mark Brown discusses infosec challenges, the need for diversity in cybersecurity, and how he picked up his tech flair from his dad.
Three tips for modernizing the CISO in 2021
8 August, 07:14
Today’s columnist, Jadee Hanson of Code42, says KPMG found that 44% of organizations will change their products, services and business models in the next few years – and that CIOs and CISOs must work together to meet this challenge.
Defining a data privacy strategy in the digital era
7 August, 06:54
Personalized customer experiences, automated business operations, and data science-driven insights all depend on the quality and volume of your data. That’s why your data privacy strategy must be more than a policy on ethics.
This email was sent to
why did I get this?
unsubscribe from this list
update subscription preferences
Corix Partners · 269 Farnborough Road · Farnborough, Hampshire GU14 7LY · United Kingdom