Cyber security guide to the 10 most disruptive enterprise technologies – See more at: http://www.information-age.com/technology/security/123458260/cyber-security-guide-10-most-disruptive-enterprise-technologies#sthash.hNSgMi8Y.dpuf
Cyber security guide to the 10 most disruptive enterprise technologies
Deploying the latest and greatest technologies in an enterprise is one of the most effective ways of gaining competitive advantage, increasing efficiency, attracting the best talent, and, ultimately, driving new business and growth. The pace of innovation has never been quicker than it is today, and it is the CIO’s job to understand which solutions are most aligned to the business goals of their organisation, and which to bat away. Most challenging of all, however, is the ability to embrace the trends disrupting the status quo whilst also ensuring the organisation is protected from cyber threats. In light of persistent high-profile data breaches, security has emerged in recent years as the number one priority for IT leaders around the world. [Read more…]Five Smart Cybersecurity Moves From Top Security CEOs
There is much that is written about cybersecurity threats to companies. Prominent examples of security breaches like the one that Target announced on December 19, 2013 have led myriad companies to re-evaluate their security posture, and investments in new security processes and technologies have increased in many companies as a result. The complexity of security threats to individuals has also increased, but no individual cybersecurity issue will receive the headlines that a corporate breach would, so one can be lulled into a false sense of security. I sought the counsel of four CEOs of major information security companies to ask them what steps they take personally to secure their information and their computing devices. They offered the following five recommendations. [Read more…]The 2014 cyber security roadmap
2014 is likely to be the year that many industries start to cash in on the much-hyped benefits of smart connected devices. But as more devices become IP-enabled, they contribute to the pool of things that can be recruited into botnets or other platforms used for distributed attacks – something which most companies are currently not prepared for, warns Mike Foreman, general manager of security software firm AVG Technologies. ‘Distributing attacks via unmanned smart devices helps make it more difficult to trace the source and easier to overwhelm the target,’ says Foreman. [Read more…]600 Retailers Ensnared in Major New Malware Attack, Cybersecurity Firm Says
The Department of Homeland Security is investigating the widespread use of “Backoff” malicious software, which steals data through remote access applications The number of businesses ensnared in a new malware attack revealed in a Department of Homeland Security report this week may run to six hundred, according to a cybersecurity firm that helped DHS prepare the report. Hackers are using point-of-sale (PoS) malware to steal consumer payment data, including credit and debit card information, from businesses that use remote desktop applications, according to the DHS report out Thursday. The department is now investigating the breaches. [Read more…]Cybersecurity should be professionalized
The time is ripe for industry and government stakeholders to consider professionalizing cybersecurity, according to a report from Salve Regina University’s Pell Center for International Relations and Public Policy (download PDF). Demand for cybersecurity skills is increasing exponentially, but the educational, training and certification processes to prep people for careers in the field continue to be highly decentralized, ad hoc and non-standard. “We not only have a shortage of the highly technically skilled people required to operate and support systems already deployed, but also an even more desperate shortage of people who can design secure systems, write safe computer codes” and create the tools needed to prevent, detect and mitigate attacks and system failures, the study said. [Read more…]
Deploying the latest and greatest technologies in an enterprise is one of the most effective ways of gaining competitive advantage, increasing efficiency, attracting the best talent, and, ultimately, driving new business and growth.
The pace of innovation has never been quicker than it is today, and it is the CIO’s job to understand which solutions are most aligned to the business goals of their organisation, and which to bat away.
Most challenging of all, however, is the ability to embrace the trends disrupting the status quo whilst also ensuring the organisation is protected from cyber threats. In light of persistent high-profile data breaches, security has emerged in recent years as the number one priority for IT leaders around the world.
– See more at: http://www.information-age.com/technology/security/123458260/cyber-security-guide-10-most-disruptive-enterprise-technologies#sthash.hNSgMi8Y.dpuf
Industry News
Follow @CI_Legal #CICyberRelated Event
When: Wednesday, October 15, 2014 to Thursday, October 16, 2014
Where: InterContinental Yorkville, Toronto
To Learn more visit: www.CanadianInstitute.com/Cybersecurity