The CFO and Cybersecurity – An Essential Partnership

It’s time the CFO got involved in cybersecurity. Remote working has opened vast possibilities for cyber-attackers to access financial data and processes, spreading risk factors well beyond the borders of the IT department.
Everything can be done, and is, on the internet these days, thanks to the global pandemic.

Read more

Driving Cybersecurity Up the Corporate Agenda

Most people know the core functions of the modern business: human resources, sales, marketing, finance, and IT all play vital roles in keeping businesses running smoothly and employees working productively. Corporate leaders have little problem focusing their attention on the needs of these departments and supporting them financially; however, there are other lesser known but equally important elements of the modern business which often go overlooked and under-resourced. Among them is one of the most important and pressing topics of today’s business agenda: cybersecurity.

Read more

Security Considerations in Choosing Cloud Data Platforms

Cloud security is more important than ever. Cybercrime is on the rise, and changes in the business world — the pivot to work from home — have made companies of all kinds more vulnerable to cyberattacks.
Data security has become a critical consideration for businesses migrating to the cloud or building a multi-cloud environment. It’s vital to know what to keep in mind when choosing a cloud data platform. Here are some things savvy companies should consider when making their selection.

Read more

Closing the Cybersecurity Communications Gap: What Every CISO Needs the C-Suite to Know

The role of the Chief Information Security Officer (CISO) has evolved considerably in recent years. So much so that in many organisations CISOs now regularly consult with the CFO, CTO and CEO on security strategy, cyber risk, and how to approach digital transformation. However, while some CISOs have been given a seat at the table on many executive boards, this hasn’t been the case everywhere.
In the past, digital security was a high priority for highly regulated industries such as banks, insurance companies as well as utilities and public sector organisations. But the recent and rapid escalation of online channels in the wake of the global pandemic has made companies in every industry sector a potential target for cyber criminals. This means C-Suite executives need to be fully informed and educated on the preventative steps that need to be taken – and why.

Read more

Ransomware’s Evolving – Are You Ready?

Ransomware is big business.  It’s difficult to accurately measure just how big; the true size of the ransomware industry is masked by the fact that not all attacks and payments are made public.  However, a simple analysis of the ransom payments in the news – where new ransomware headlines appear almost daily – reveals a multi-billion-dollar industry.  Ransomware attacks are estimated to occur every 11 seconds, with the total cost of attacks to businesses exceeding $20 billion last year.  
In 2022, there are no signs ransomware is slowing down.  From ransomware as a service (RaaS) to Big Game Hunting, cybercriminals are becoming increasingly sophisticated; ransomware represents one of the greatest threats facing businesses today.  For chief information security officers (CISOs) and the wider executive leadership team, navigating the modern ransomware landscape is challenging.  Attackers are almost always one step ahead – with innovative, well-funded and coordinated teams utilising every tool at their disposal to penetrate corporate networks.  It can be difficult to know exactly what form a threat might take and where best to focus risk mitigation efforts.    

Read more

What is Vendor Lock-In and how to avoid it?

The proliferation of digital technologies has impacted how organizations are doing business and interact with customers and vendors. Nowadays, organizations are increasingly utilizing cloud services to facilitate running most of their IT services.
This introduction about cloud computing and its widespread adoption is necessary because vendor lock-in most frequently happens in cloud environments. This article sheds light on the term “vendor lock-in” and discusses best practices to mitigate its negative impact on business operations.
This introduction about cloud computing and its widespread adoption is necessary because vendor lock-in most frequently happens in cloud environments. This article sheds light on the term “vendor lock-in” and discusses best practices to mitigate its negative impact on business operations.

Read more

The Importance of Cloud Security Governance

Cloud security, and in particular cloud security governance, is becoming an increasingly important area for security professionals to pay attention to. Cloud security has been on our radar since the inception of the whole cloud concept, but with the increase in the number of different cloud environments available, some special and some general, and the move to cloud-first deployments for companies around the world, having governance in place for the security of these clouds is becoming a business-critical issue.

Read more

Deception in the Workforce: Utilising Security Capabilities to Mitigate Insider Threats

Insider threats are a significant danger to any organisation, whether it’s data leakage from careless employees, or hackers with compromised credentials. Defending against insider threats is becoming increasingly difficult as the IT ecosystem evolves, and organisations shift to the cloud and remote work, and enable Bring Your Own Device.

This new article from Anurag Kahol, CTO of Bitglass, takes a closer look at the impact such working practices are having on data security and how businesses can improve their security posture to keep their data safe.

Read more