Next-generation connected cars require a solid security foundation
Connected cars demand the same level of attention as any other feature of a company’s network. In the past, a car’s electronic control systems were always internal, so there was...
Connected cars demand the same level of attention as any other feature of a company’s network. In the past, a car’s electronic control systems were always internal, so there was...
This blog post discusses a new study into boardroom attitudes of cybersecurity conducted by CGI in the UK in conjunction with the Centre for Economics and Business Research (Cebr).
Financial institutions in the U.S. are well aware of the business risks related to cybersecurity but there are an increasing number of related regulatory risks that also need to be...
This CGI blog post focuses on the approaches, solutions and expertise required to ensure cloud security
A top business priority for banks today is to have a complete 360 degree view of customers through the collection and use of personal data. To effectively manage data, it...
This blog post discusses how unfettered access to cloud applications for local government innovation initiatives could also give rise to shadow IT that increases complexity, costs and security risks.
Passwords remain the single most common user authentication technology, but they are also the least secure. Here are a few things you can do to make your organization less vulnerable...
The role of the chief information security officer (CISO) has become increasingly mainstream and strategic in recent years. While mandates vary among organizations, the CISO’s role has evolved from being...
This CGI blog post discusses the different types of security risks involved with hybrid IT delivery models
Despite increasing regulations across the finance sector globally, fraud and associated risks continue to increase—and at a staggering pace. Thomson Reuters was recently quoted as saying, “Increased regulation isn’t just...