Mar 08, 2023 Seven levers to optimize cybersecurity cost and balance security needs By Megha Kalsi Lukas Weber There are many security leaders across the globe that experience the hardship of budget reduction every year or during uncertain times...
Feb 27, 2023 What is Digital Resilience? By Derek Taylor Uwe Kissman To paraphrase Frederick the Great, who died in 1786, 'He who defends everything, defends nothing'. Let’s discuss a single word:...
Feb 10, 2023 The war for talent – Part 2 of 5: How to overcome the digital mismatch By Piero Masera Marcello Bellitto Filippo Guidotti Mori One of the most critical issues in today’s labor market is the lack of alignment between supply and demand, calibrated on the new digital...
Feb 10, 2023 La guerra dei talenti – Ep. 2: Come superare il digital mismatch By Piero Masera Marcello Bellitto Filippo Guidotti Mori Una delle principali criticità nell’odierno mercato del lavoro è la mancanza di allineamento tra domanda e offerta calibrata sulle nuove...
Jan 25, 2023 Insider threats: Practical steps to prevent a costly breach By James Habben The term “insider threat” is commonly used within the cyber security and information security industries, referring to a risk posed by...
Jan 10, 2023 Cybersecurity Trends for 2023: How to protect your organization from attackers in a recessive economy By Megha Kalsi Nate Morin David Stanton Doing more with less: It's the new shift for cybersecurity. Driven by a looming recession and increased management scrutiny around...
Jan 03, 2023 Three winning strategies to combat the ever-increasing sophistication of cybercriminals By Lukas Weber Tim Roberts In the age of rapid technological evolution, cybercriminals have been one of the many benefactors of novel technology, capitalising on...
Nov 14, 2022 Digital Trust in Manufacturing – here comes the Chief Product Security Officer By Ismail Mohammed Business leaders often view cybersecurity as a specialized IT role when in reality, it is a subset of enterprise and business risk...
Nov 07, 2022 Mehr als nur Technik: Was Organisationen tun können, um ihre Verwundbarkeit für Cyber-Angriffe zu reduzieren By Daniel Weyh Wie so oft im Leben ist es bei Cyber-Security so, dass Vorbereitung essenziell ist, um einerseits Eintrittswahrscheinlichkeit und...
Oct 20, 2022 Industry 4.0: Seek the reward, mind the risks By Sudeep Saxena Allen Merriman Les Viszlai Thilo Wallenstein Pablo Wangermann Antonio Perez Senande Gary Tong +4 more... Show less Industry 4.0 offers great promise, but with this promise comes risk. A host of cybersecurity vulnerabilities require careful attention....
Sep 20, 2022 How to count the cost of cyber risk to drive competitive advantage By Roger Auinger Cyber risk are trigger words for individuals and corporations alike – from a mental check-up on personal password quality to anxiety over...
Sep 08, 2022 Outmaneuvering cyber threats | Private Equity International - Disruption Matters Podcast By Beth Musumeci
Sep 02, 2022 Misery Loves Company By Joseph Freeh Sean Kearney How can understanding the current U.S. economic environment enhance cybersecurity risk visibility? Since the 1940s, the Misery Index has...
Aug 30, 2022 Breaches may be inevitable, but the way organisations respond is what really matters. By Edd Hardy As cyber consultants, we often say that breaches are inevitable, it's not if but when, and that having pre-written and tested plans will...
Aug 23, 2022 Cyber Healthcare Series: Three imperatives that should define your medical device security strategy By Beth Musumeci Stanley Awenlimobor Leo Berrun Forty million – this is the stark number of individuals impacted by reported cybersecurity breaches from 697 healthcare entities between...
Jun 23, 2022 The business case for building a Virtual Power Plant - and 5 IT watchouts if you do… By Les Viszlai I wrote in my previous article about the Energy Cloud and the benefits offered by Distributed Energy Resources (DERs) and Virtual Power...