Today’s threat landscape is nothing like it was 10 years ago – simple attacks that caused containable damage have given way to modern cybercrime operations that are sophisticated, well funded, and...
What a business-centric security model looks like
The traditional concept of having a perimeter to defend is rapidly losing all relevance. Today’s enterprise is effectively ‘borderless’; customers and suppliers transact from anywhere in the world,...
Tags Digital Transformation, Cloud, Security, BYOD, cloud services, data security, featured, IT security, BYOD policy, Shadow IT
How to prevent a data breach: lessons from the Target hack
In December 2013, Target became a target itself as the victim of the biggest retail hack in US history. Attackers planted point-of-sale malware and intercepted approximately 110 million records worth...
Tags Digital Transformation, Security, data security, IT security
Why CIOs need to embrace shadow IT
Back in 2011, industry experts warned of an increase in unauthorised IT systems within organisations as IT departments failed to keep pace with employees’ technology demands and the consumerisation...
Tags CIO, Digital Transformation, Security, data security, IT Department, IT security, Shadow IT