When it comes to your data in the cloud, thieves or snoops do not pride themselves on the ability to break into or access a server; they pride themselves on the information they are able to get from that server: your data ... READ MORE
Released by Corporate Compliance Insights - August 2013
When it comes to locking down enterprise infrastructure, the application layer is responsible for more than 90% of all security vulnerabilities, yet more than 80% of IT security spending continues to be at the network and endpoint layer, new research has found ... READ MORE
Released Infosecurity Magazine - August 2013
Cybersecurity is more than an IT challenge it's a business imperative. Our research with business leaders has revealed that cybersecurity is a growing concern. However, many CEOs and boards have yet to truly appreciate the seriousness and magnitude of this critical business issue ... READ MORE
Released by PwC NZ - April 2013
Social media can take many forms, including, but not limited to, micro-blogging sites ( e.g., Facebook, Google Plus, MySpace, and Twitter); forums, blogs, customer review sites and bulletin boards ( e.g., Yelp); photo and video sites ( e.g., Flickr and YouTube); sites that enable professional networking ( e.g., LinkedIn); virtual worlds ( e.g., Second Life); and social games ( e.g., FarmVille and CityVille). As companies use these and other sites to develop and expand a social media presence, however, that activity has the potential to impact a company's risk profile ... READ MORE
Released by Corporate Compliance Insights - June 2013
Organisations should use remote wipe and apply encryption to mobile phones in addition to normal security measures. Alan Calder explains what can be done to mitigate the risk of losing your personal or corporate data ... READ MORE
Released by IT Governance UK - 2013