In a world in which cyber attacks are increasing in frequency and severity, companies rely heavily on technology to secure their data and systems. But what if your company is a tech company? This article focuses on the cyber risks for tech companies.
As high-profile, large-scale data breaches hit the headlines more and more regularly, the question of ‘cyber trust’ is becoming a key concern for increasingly discerning citizens. This blog post highlights why insurers must guard their customers' data wisely to maintain their trust.
Find out the key data on your customers' attitudes towards cyber security to help identify a transparent and effective strategy to retain confidence and trust in your brand.
Cybercrime is becoming a costly reality for law firms with 62% of all law firms in the UK experiencing a cyber security incident in 2017. This whitepaper sheds light on the appeal of law firms to cyber criminals and the steps law firms can take to strengthen their cyber security.
In this BIBA guide, our third for 2018, we look at what needs to be kept in mind when developing security measures to defend a business's assets against both new and traditional threats, using tried-and-tested methods in combination with emerging technology.
World leaders are increasingly concerned about cyber warfare. Finance, communications, energy, water, food and health infrastructures are all vulnerable to attack. This article looks at recent developments in the US and Europe and asks “should European companies take the threat more seriously?”
The FFIEC recently released a supplement to the 2005 “Authentication in an Internet Banking Environment” guidelines, which aim to protect internet banking customers from online fraud. This white paper from Trusteer looks at ways in which your business can achieve compliance with these guidelines.
Venafi has joined forces with IT security research firm Echelon One to establish a set of 12 IT security and compliance best practices, and to evaluate how Global 2000 enterprises, government agencies and other organisations were succeeding or failing when it comes to implementing critical…
This paper will discuss the security capabilities of MicroStrategy Mobile on Apple’s mobile devices. The combination of these two security feature sets provides enterprises with flexible security architecture strong enough to protect your corporate information.
Ben Beeson examines the risks facing organisations as the data security landscape changes in Europe. He focuses on the issues facing companies with employees, offices, client contracts, subsidiaries or possible acquisition plans in Europe.