Today’s Internet of Things (IoT) adopters have grave concerns for the security of their devices and networks according to research carried out by IMC (the International IoT M2M Council). Commissioned by Pod Group, the provider of platforms, software and connectivity services for the IoT, the…
Risk Management
-
-
Very few Tier 1 construction companies are installing water leak detection systems at the beginning of new build projects. This may be for cost reasons, or because the construction companies may not feel it’s their responsibility to implement these systems. Yet repairs to damage caused…
-
LastPass by LogMeIn has issued the results of its third annual Global Password Security Report: a study that offers insights into employee password behaviours as well as emerging trends around identity and access management at businesses worldwide. Among the key findings from this year’s report…
-
Adversarial social media activity was a relevant factor in 27% of significant incidents suffered by global businesses in the last 12 months, according to data from the latest Global Fraud and Risk Report released by Kroll (the specialist in risk mitigation, investigations, compliance, cyber resilience,…
-
As a Chief Information Security Officer (CISO), you’re likely to have put forward many plans designed to improve the overall security posture for the users of your organisation. Much of the time, you’ll receive executive sign-off and then roll out whatever initiative it might be.…
-
Talking about compliance and competitive advantage in the same sentence can sound like a bit of an oxymoron, writes Andrew White, but as today’s security and risk management professionals face an ever more complex regulatory landscape, not only meeting compliance requirements, but also looking at…
-
Carbon Black, the cloud-native endpoint protection company, has issued the results of its third UK Threat Report based on a survey of 250 CIOs, CTOs and CISOs across the UK. The results show that the threat environment is “sustained and sophisticated” with phishing attacks serving…
-
A resilient organisation is one that can fulfil its strategic aims, such as economic growth, developing competitive advantage or increasing profits, regardless of any adverse issues it faces either internally or externally. Such an organisation is seen to not only survive operational disruption or hostile…
-
The threats facing the UK’s world-leading universities and the steps they can take to protect themselves are outlined in a new report from the National Cyber Security Centre (NCSC). The NCSC’s threat assessment aims to raise awareness of state-sponsored espionage targeting high-value research, as well as…
-
Business improvement company BSI has released BS EN IEC 31010:2019 Risk Management – Risk Assessment Techniques to give guidance on how to select and apply risk assessment techniques in a wide range of contexts. Organisations have the duty to ensure the health, safety and welfare…