Category Archives: Cyber Security Strategy

Why the CISO’s Voice Must be Heard Beyond the IT Department

In a recent company board strategy meeting the CFO presented the financial forecast and outcome and made some interesting comments about fiscal risks and opportunities on the horizon. The COO

The post Why the CISO’s Voice Must be Heard Beyond the IT Department appeared first on The Cyber Security Place.

Are Lawyers the Best Judge of Cybersecurity?

I had to do a double-take when I read that Japan’s deputy chief of government cybersecurity strategy, Yoshitaka Sakurada said he has never used a computer. That pretty quickly became a

The post Are Lawyers the Best Judge of Cybersecurity? appeared first on The Cyber Security Place.

The Only Counter Strategy Against Data Loss: Reliable Backup Methodology

By Julia Sowells Senior Information Security Specialist at Hacker Combat, In the turn of the century 18 years ago, people have embraced Web 2.0, a new dynamic web replacing the static

The post The Only Counter Strategy Against Data Loss: Reliable Backup Methodology appeared first on The Cyber Security Place.

UK MPs Call For A Cyber Security Minister To Defend Critical Infrastructure

The joint committee on national security strategy called the current security leadership ‘wholly inadequate’. A UK parliamentary committee has urged the government to appoint a dedicated cyber security minister to

The post UK MPs Call For A Cyber Security Minister To Defend Critical Infrastructure appeared first on The Cyber Security Place.

The Top Security Breaches in History

By Telemessage, Technology has indeed enabled companies of all sizes and nature to rethink and innovate the way they do business. Through the power of the internet, digital platforms, and

The post The Top Security Breaches in History appeared first on The Cyber Security Place.

Cybersecurity and ethical data management: Getting it right

Data can provide information, information can lead to insight and knowledge, and knowledge is power. It’s no wonder, then, that seemingly everybody in this modern, computerized world of ours loves

The post Cybersecurity and ethical data management: Getting it right appeared first on The Cyber Security Place.