Security

TrustCheck: Challenging Assumptions in Cyber Risk Management

July 27th, 2018

When I was 12 years old, my dad told me, “Never assume, it makes an ass out of u and me.” I don’t recall the context of the discussion, but I do remember responding appropriately with a groan. As I got older, I realized that assumptions are a necessary part of decision-making. But it’s also wise to challenge those assumptions—any time I start to question mine, I think back to that #DadJoke. Cyber risk management is heavily dependent on assumptions. As security leaders, we rely on heat maps, vulnerability counts and patches.... read more.

Continue reading...

Security

Modern Tools for Today’s Growing Threat Landscape

July 27th, 2018

Warmer days bring greener landscape, but with this growth comes maintenance, such as weekly grass trimming. The lawn mower has evolved from sheep, to scythe, to reel cutter, to engine-powered blades—now in the computer age, it uses automation to mow consistently and constantly. Trading my gas-powered lawn mower for a robotic one, I finally decided to stop applying 20th century technology to my 21st century landscape. So why are we not doing the same for cybersecurity?

Continue reading...

Life Sciences and Healthcare

Medical Device Management: The High Cost of Doing Nothing

July 24th, 2018

An average hospital system has thousands of stationary and mobile medical devices and spends millions of dollars on maintenance, purchasing, and leasing. However, when it comes to investing in an integrated solution that can manage these effectively, decision makers are reluctant to change status quo or move away from existing approaches that are "working". But maybe doing nothing is actually costing them more...

Continue reading...

Workspace

BYOD – More Than Just Technology

June 28th, 2018

One of the controversial conversations in the digital workspace right now is BYOD. Some companies are just looking at mobile phones, others are considering all devices, but the conversation is all around technology. We often focus on the technology, but let's take a look at it from the employee perspective. What is the real-world impact of BYOD organisational culture?

Continue reading...

Security

Why Do Some Travellers Resist the Use of Biometrics?

June 27th, 2018

The Unisys Security Index revealed that 75% were willing to use a biometric to confirm their identity at an automated boarding gate when boarding a flight and 71% were willing to use a biometric to identify themselves as a frequent traveller of low security risk. This is good news for government agencies, airports and airlines that are expanding the use of biometrics as part of a seamless and secure travel experience. But it begs a question. Why are over 20% of travellers UNWILLING to use a biometric to identify themselves when travelling?

Continue reading...

Security

Protect the Critical: A New Approach to Cybersecurity

June 15th, 2018

With increasing demand for the free flow of data to conduct daily life, businesses and governments are forced to rethink how they made data and systems available. For security professionals, protecting the critical has become a boardroom concern of how to increase productivity without putting the organization at risk.

Continue reading...

European Voices

Innovation or Obliteration? How the Pharmaceutical Supply Chain Can Secure Itself from Attack

June 14th, 2018

The pharmaceutical industry is challenged with keeping up with the constant development of groundbreaking research, alongside the barrage of new innovations, regulations and digital technologies. As the sector charges full-speed into the digital age, how it responds to these stimuli, and how it adapts its business models, will be crucial in determining its success in creating the supply chains of tomorrow.

Continue reading...