Will Every IT Security Risk Now Be Followed by a Fake Risk?
It would be risky to generalise from one specific example in IT security, but the case of fake ransomware is intriguing.
DetailsIt would be risky to generalise from one specific example in IT security, but the case of fake ransomware is intriguing.
DetailsSupply Chain Resilience have so many moving parts that rapidly becomes a priority issue.
DetailsIn business continuity planning, business impact analysis or BIA is possibly the most critical part.
DetailsLet’s be honest. Between ‘Risk Evaluation’ and ‘The Science of Danger’, the second name has more star quality.
DetailsWhere do cyber criminals focus their attacks? On the organisations with the information of most interest or highest worth, naturally enough.
DetailsAs IT morphs from legacy on-site systems and firewalls to cloud computing, mobility and data-anywhere, it is having to change in terms of agility and security.
Details