There is a general lack of understanding amongst IT professionals regarding exactly what they needed to change in everyday processes to achieve regulatory compliance (under GDPR).
There are some difficult obstacles to overcome in the cyber-security tough-mudder challenge, from ransomware and phishing to insider threats and GDPR, but thorough preparation can boost your chances of success.
The prospect of a cyber-attack on any organisation can be very daunting. However, if you have the processes, contacts and a strong response plan at the ready, the situation can be dealt with much more effectively.
IT and security leaders must elevate IAM out of the realm of IT, via a programme management approach, so it becomes a business-wide initiative; IAM leaders need to assert themselves in digital transformation initiatives.
The key to achieving 'pay as you grow' security is to move away from traditional rigid security product models tied into the infrastructure by embracing an overlay approach that decouples security from the connectivity infrastructure.
The opening ceremony for the Pyeongchang Winter Olympics in South Korea is still a month away, but cyber-criminals have already started using it as part of their social engineering plans in several phishing attacks.
Truly resilient IT plans combine security and recovery so in the event an attack does infiltrate the firewall, it is critical that organisations have a plan that allows for rapid recovery and business operations as usual as quickly as possible.
Several NATO members are contemplating a change in the alliance's doctrine regarding how it might react to future cyber-attacks, possibly enabling a more robust response.
The UK Chancellor Philip Hammond, announced his autumn budget today, and while it was a pro-tech budget, he had nothing to say specifically about cyber-security, hence the industry has had a lot to say about his plans.
Innovation in the IoT may be rapid, but security trails far behind. Nick Cook looks at why securing the IoT must be a priority, not an afterthought, and how collaborative action is fundamental to ensuring its successful future.
All organisations based at least partially online and handling data across the EU must comply with the new GDPR rules yet 69 percent of UK businesses are not ready. Being unprepared is dangerous warns Dr Jamie Graves.
Kinetic attacks have come off the movie screen and into reality, and you are likely to be vulnerable - if not directly, then via collateral damage if CNI is hit - so include the possibility on your risk register and prepare says Graeme Park.
When Clapham Junction train station ejected everyone after being overwhelmed by an unexpected event last week the problem became one of resilience - and the impact of pre-planning came to the fore.
In instalment two of his four-part viewpoint series, Tony Collings outlines the design and development phase of the project - the key challenge: getting the solution right.
In instalment one of his four-part viewpoint series, Tony Collings outlines the first of his essential building blocks for the successful implementation of an IT project: have you got the business requirement right?
Wolfgang Kandek notes that a key concern for countries securing critical infrastructure is ensuring legislation compliance doesn't limit flexibility, and asks if new German laws might provide a benchmark.