How a policy of privacy by design sets your business up for the long term While for some, compliance with the General Data Protection Regulation (GDPR) was business as usual (BAU), for others it represented a huge effort—and a bit of a panic for a minority. No matter an organization’s readiness, one of the regulation’s most significant outcomes is the perception that cybersecurity is no longer just “an IT thing.” It’s a board-level issue. More...

The aim of cyber attacks traditionally has been to either disrupt the target’s web service or to steal important information and other assets. A new and quickly spreading phenomenon is to steal computing power to mine cryptocurrencies. What is most alarming is that, in addition to advanced cyber attacks aimed at elaborate systems, criminals will use any device connected to the Internet – for example, your mobile phone or a remotely controlled heat pump. More...

At a recent technology breakfast, I heard an attendee ask a speaker about an approach to modernize security. The question reminded me of a thought I’ve had often: You can’t build without a foundation. Modernizing security sounds like a great goal, but the reality is, most organizations are still struggling with the basic elements of securing information and information assets. New tools and technologies can make a big difference, but organizations must first deploy sound policies and processes to protect data and information assets. More...

Pages