Cybersecurity

Security Consultant Insights Series 2021 – Episode 3/4

Advancements and Applications in High Security Buildings & Technical Design Considerations NOW AVAILABLE ON-DEMANDCONDUCTED WEEKLY JUNE 2021 Episode 3: Building Automation Systems Leading Consultants offer their expert knowledge on… Practical approaches These sessions are designed to provide leading insights into the practical approaches needed in establishing high security environments.  Project learning outcomes Strategies and knowledge […]

Security Consultant Insights Series 2021 – Episode 3/4 Read More »

Security Consultant Insights Series 2021 – Episode 4/4

Advancements and Applications in High Security Buildings & Technical Design Considerations NOW AVAILABLE ON-DEMANDCONDUCTED WEEKLY JUNE 2021 Episode 4: Video surveillance systems & CPTED Leading Consultants offer their expert knowledge on… Practical approaches These sessions are designed to provide leading insights into the practical approaches needed in establishing high security environments.  Project learning outcomes Strategies

Security Consultant Insights Series 2021 – Episode 4/4 Read More »

Inside the mind of the CISO 2021

The definitive study on what makes outstanding thought leadership in the cyber industry Introduction Cyber marketing specialists face the constant challenge to contribute to the bottom line. Indeed, it is the reason for their existence. Whether start-up, scale-up or enterprise marketing specialists have to develop a broad array of tactics, optimising budgets against each stage

Inside the mind of the CISO 2021 Read More »

2021 Voice of the CISO report

2021: THE AFTERMATH OF A YEAR LIKE NO OTHER There’s no question that 2020 was a challenging year – for organizations and individuals alike. The pandemic placed an enormous strain on the global economy, and cybercriminals took advantage of this disruption to accelerate their nefarious activities. We were inundated with cyberattacks, both new and familiar,

2021 Voice of the CISO report Read More »

Win the talent battle

A Randstad survey of more than 400 tech industry leaders reveals that a shortage of emerging technology talent poses an immediate threat to the growth and competitiveness of Australian businesses. Without fresh solutions, the problems will continue to get worse. So how can your organisation secure the scarce skills it needs to succeed? The past

Win the talent battle Read More »

Getting Ready for Post-Quantum Cryptography

Cryptographic technologies are used throughout government and industry to authenticate the source and protect the confidentiality and integrity of information that we communicate and store. Cryptographic technologies include a broad range of protocols, schemes, and infrastructures, but they rely on a relatively small collection of cryptographic algorithms. Cryptographic algorithms are the information transformation engines at

Getting Ready for Post-Quantum Cryptography Read More »

Modern Bank Heists 4.0

This marks the fourth edition of the Modern Bank Heists report, which annually takes the pulse of some of the financial industry’s top CISOs and security leaders. Thank you, again, for reading along, and thank you to the 126 security leaders who participated in this year’s study. 48 percent of the financial institutions (FIs) are

Modern Bank Heists 4.0 Read More »

Acronis Cyber Protection Week Global Report

KEY RESEARCH FINDINGS Investing in more solutions doesn’t mean more protection To protect business data, applications, and systems – particularly during the pandemic’s shift to remote work environments – organizations added new solutions to their IT environments. It’s not working. ~75% of IT professionals report that their organizations have all recommended cybersecurity technologies in place

Acronis Cyber Protection Week Global Report Read More »