I've known Mike Tanji since 1998 and have had the pleasure of working with him in a variety of capacities since then. Am very proud that he is part of our OODA network and immensely enjoy his special reporting on the cyber threat at OODAloop.com Among Mike Tanji's many superpowers is one I really admire and wish I had. He has a highly developed ability to explain complex … [Read more...] about New Book From Mike Tanji Provides No-Nonsense, Hype Free Guide To Cybersecurity For Small To Midsized Businesses
Cybersecurity Is Not Just About The Tech
|Cybersecurity may well be the most important function in the modern world. Without it, nothing else can be trusted, in any sector of the economy.|
|Cyber Security is far more than just protecting data. Security is about protecting the functionality of IT. It involves confidentiality, availability and integrity of resources. This higher order approach to cyber security requires vision, leadership, and actions in dimensions of people, process and technology.|
|We also need to draw your attention to the higher order concept of Cyber War. This is, unfortunately, something all technologists should be familiar with now. The most critical piece to read on that topic now is Now That You Are A Soldier In The Cyber War You Must Know Your Cognitive Biases followed by: Main Street Cybersecurity: Can Email Be Safe? and Time for Transformational Cybersecurity!|
When it it time to research the great providers of Cybersecurity Solutions, kick off your search in the CTOvision Disruptive Technology Finder. Pay particular attention to the sections on Cybersecurity, CASB, Cyber Threat Intelligence, and VPN.
|For help putting all this information into context for your business, consider tapping into Crucial Point's CTO-as-a-Service or Technology Due Diligence offerings, both are ways to quickly leverage the technical talents of experienced enterprise technology professionals.|
This is the CTOvision guide to the megatrend of Cybersecurity. This post provides a high level overview of key factors in cybersecurity that we recommend any technology professional should be familiar with, as well as insights that can help assess the near future of cybersecurity solutions. The report also captures insights from recent reporting done on the topic as well as … [Read more...] about CTO Guide To The Business of Cybersecurity
Over 2.3 billion files -- including sensitive data like payroll information, credit card details, medical data and patents for intellectual property -- are exposed publicly online, putting both people and organisations at risk of data theft, cybercrime, espionage and other malicious activities. Analysis by researchers at cybersecurity company Digital Shadows found the highly … [Read more...] about Cybersecurity: The number of files exposed on misconfigured servers, storage and cloud services has risen to 2.3 billion
Popular news aggregation site Flipboard – one billion app downloads from Google Play and counting – has become the latest internet company to admit it has suffered a breach. We’ve covered a lot of data breaches in recent years but this one has one or two wrinkles that are worth highlighting. According to Flipboard, hackers gained access to data between 2 June 2018 and 23 March … [Read more...] about Flipboard data breach – what users should do now
Read why James Sanders says that standard security practices among IT companies do not necessarily carry over to the IT departments of other firms, leading to products sold without basic security measures in place on Tech Republic : Vulnerabilities in Industrial Control Systems are an outsized threat in the manufacturing sector, and can have ripples in the economy at large—as … [Read more...] about Lack of basic security hygiene putting industrial control systems at risk.