Data Breaches and Business Resilience: What’s The Relationship? Data Security Is your business resilient enough to weather the storm that is a data breach? Should the 0
Responding to the growing threat of human-operated ransomwa… Responding to the growing threat of human-operated ransomware attacks Human-operated ransomware attacks are now one of the top priority cyber threats faced by most organisations. In this 1
Getting Started on Application Security – Cyber Security Summit Application Security In order for an organization to have a successful Application Security Program, there needs to be 1
Communicating Application Security Success to Your Executiv… Communicating Application Security Success to Your Executive Leadership 3
2020 Cyber Threatscape Report 2020 Cyber Threatscape Report In the past year, security strategies and practices have been tested like no other. Rapidly accelerated digital transformations, 2
2020 Deloitte–NASCIO Cybersecurity Study 2020 Deloitte–NASCIO Cybersecurity Study he sixth biennial Deloitte–NASCIO Cybersecurity Study reflects insights from 51 state and territory respondents on the CISO’s role 5
How does security evolve from bolted on to built-in? How does Security Evolve from Bolted on to Built-In? Welcome to the 22nd annual EY Global Information Security Survey (GISS), which explores the most important cybersecurity issues 2
All hands on deck: Key cyber considerations for a new reali… All hands on deck: Key cyber considerations for a new reality 1
Four Application Security Myths – Debunked Application Security Application Security is a crucial component to all software development today. At least, it should 0
Building a Business Case for Expanding Your AppSec Program Building a Business Case for Expanding Your AppSec Program No matter what industry you compete in, application security is no longer an option. With code vulnerabilities and 2