OPINIONS
 
How does top management ensure that it is sufficiently protected against cyber risk?
Security solutions have to be tested thoroughly to ensure that they are bringing you the value that you are expecting. You should verify whether they work as intended before someone else does it for you.
OPINIONS
 
As technology rapidly evolves, the complexity of protecting that technology increases exponentially. Threats and threat actors are becoming more sophisticated, while the number of IoT devices increases year on year, providing attackers with a greater pool of potential victims. All this change means (...)
OPINIONS
 
Threat Intelligence. This seems to be a subject that everybody is throwing around with great abandon. There are as many opinions on what it is, as there are vendors who would like to get in on the action surrounding it. But what is real threat intelligence?
OPINIONS
 
We are increasingly interconnecting our infrastructures (for good reasons), but are we paying enough attention to the risks associated with this? And if we are aware of the risks, are we allocating enough resources to securing these connections?
OPINIONS
 
In 2016, penetration testers acting as an external attacker, were able to gain access to corporate networks 55% of the time, according to this report. When acting as internal intruders, they were able to compromise the security in all cases. In 2015, the equivalent report had these numbers at 28% (...)
OPINIONS
 
When you are responsible for managing your information security, ideally you would want to do it all. But a number of factors, such as money, time, competencies and value for money, force you to prioritise. On top of that, information security has steadily become that black hole that we can keep (...)
OPINIONS
 
Using cloud, whether it’s a stand-alone solution, or is integrated into the existing IT infrastructure, creates complexity, which needs to be handled by the procedures that are already in place at the company.
OPINIONS
 
SCADA systems have been running offline for years, but those days are long gone. Now, they often rely on connectivity to the Internet, but because they have been running offline for decades, the security of these systems is not ready for online exposure. So how do we secure SCADA systems?
OPINIONS
 
Outsourcing security to providers is a necessity for many organisations - but there are certain things that you need to keep in mind when doing so.
OPINIONS
 
Governments have a legitimate need to be able to access information in cases where a court order has been issued for accessing it. But calls for a general weakening of encryption will result in an alarming reduction in the security needs for not only businesses, but also the general public.
OPINIONS
 
January is a time of rethinking and contemplation: how can we improve, and which new challenges will the year bring? FortConsult’s focus this year is to help our clients rethink the way they traditionally approach the monumental challenge that is cyber security.
Subscribe to Opinions