OPINIONS
 
Is the cyber security threat landscape based on fact or fiction? It’s just one question we posed to our own security experts Tim Anderson and Graham McElroy as we chatted to them to find out more about their thoughts on how organisations can reduce their cyber risk.
OPINIONS
 
How do you prepare your organisation most effectively against cyber-attacks and how do you balance the ROI at the same time? The short answer is: Create a plan and practice it!
OPINIONS
 
Considering security holistically in the development of Application Programming Interfaces (APIs), will protect customer data in Open Banking and make the task less complex. Creating the future’s innovative bank is about embracing the possibilities of Open Banking instead of its limitations.
OPINIONS
 
The basis for mandating financial institutions to carry out a TIBER test, is to ensure that an entire nation does not come to a standstill if one of its largest banks suffers a severe cyber attack. As this is the logic behind the initiative, then why shouldn’t other critical sectors be inspired by (...)
OPINIONS
 
Financial institutions in Denmark are regulated by TIBER-DK, which is a Red Team test framework, established with the aim of strengthening cyber security in the sector. A TIBER test is a long and resource-consuming process that requires months of preparation and planning for even the most security- (...)
OPINIONS
 
When you are responsible for managing your information security, ideally you would want to cover every possible angle. But a number of factors, such as financial resources, time and competencies, force you to prioritise. If prioritising is a challenge, a good exercise is to simulate a constraint. (...)
OPINIONS
 
Director of Risk Management & Governance in FortConsult, Peter Brahe talks about what he is looking for when hiring new IT security consultants, how talent is developed in FortConsult, and the requirements that he sets for his consultants.
OPINIONS
 
We bring you closer to the people of FortConsult with our "Meet the Team" series, where we question our colleagues about how it's really like to work in IT security. Security consultant Christoffer Olsen from our Technical Security Consulting (TSC) team, answers four short questions (...)
OPINIONS
 
How does my company avoid a cyber attack with catastrophic consequences? If you are an executive or board member in an organisation, you might have given the question some thought. I hear too many people say that they cannot protect their company from sophisticated and state-sponsored cyber attacks (...)
OPINIONS
 
In today's cyber threat landscape, your focus should not merely be on avoiding being hit by a cyber attack – very few organisations manage to avoid incidents completely. This means that what really matters is the way your business handles the attack when it strikes, and how quickly you can get (...)
OPINIONS
 
How does top management ensure that it is sufficiently protected against cyber risk?
Security solutions have to be tested thoroughly to ensure that they are bringing you the value that you are expecting. You should verify whether they work as intended before someone else does it for you.
OPINIONS
 
As technology rapidly evolves, the complexity of protecting that technology increases exponentially. Threats and threat actors are becoming more sophisticated, while the number of IoT devices increases year on year, providing attackers with a greater pool of potential victims. All this change means (...)
OPINIONS
 
Threat Intelligence. This seems to be a subject that everybody is throwing around with great abandon. There are as many opinions on what it is, as there are vendors who would like to get in on the action surrounding it. But what is real threat intelligence?
OPINIONS
 
We are increasingly interconnecting our infrastructures (for good reasons), but are we paying enough attention to the risks associated with this? And if we are aware of the risks, are we allocating enough resources to securing these connections?
OPINIONS
 
In 2016, penetration testers acting as an external attacker, were able to gain access to corporate networks 55% of the time, according to this report. When acting as internal intruders, they were able to compromise the security in all cases. In 2015, the equivalent report had these numbers at 28% (...)
Subscribe to Opinions