It’s not just about Big Data, it’s what you do with it
Worldwide IT spending is forecast to surpass $3.6 trillion in 2016, a 1.5 percent increase from 2015, according to Gartner, Inc. The IT industry is being driven by digital …
Applying machine learning techniques on contextual data for threat detection
The momentum behind cloud computing couldn’t be stronger as companies, governments and other organizations move to the cloud to lower costs and improve agility. However, you …
Cybersecurity is being taken seriously around the globe
There has been a dramatic increase in the attention that boards and executives are paying to cybersecurity risk management, according to a new global study developed by the …
Is your board ready for a security incident?
Businesses suffered nearly 43 million known security incidents in 2014. This increased 48% compared with 2013 and equals some 117,000 attacks daily. And still, many boards and …
The changing role of the risk manager
71% of risk managers say their overall level of influence is greater now than it was three years ago according to a survey of 500 companies in EMEA conducted for ACE European …
CISOs are looking for more integration and automation
Enterprise CISOs are looking for more integration and automation among their existing IT security tools, and that most are only periodically monitoring and mitigating events …
The evolution of the CISO in today’s digital economy
As the digital economy becomes ever more connected and encompasses all industries, we’re reaching a point where every company today is a technology company. Along with this …
Cyber risk still poorly communicated to C-suite executives
Cyber risk continues to be poorly communicated to C-suite executives, according to Auriga Consulting. The monopolisation of the risk management function by IT and security …
Data security for the borderless enterprise
With the advent of cloud computing, social media and mobility, data is moving and proliferating at pace across borders, platforms and applications, very rarely staying within …
Best practices for ensuring compliance in the age of cloud computing
When was the last time you heard someone utter the sentence, “I’m looking forward to the audit next week.” Most likely, never. Since its invention, the word “audit” has struck …
Why collaboration is crucial in the battle for IT security
Guy Wertheim, the CTO at Comilion, talks about the importance of collaboration and data sharing in the battle for increased security. Modern organizations are tackling a …
Should a data breach be the kiss of death for the CEO?
The fact that CEOs have tendered their resignations in the aftermath of public breaches is a clear indication that the executive level is being held more accountable for the …