
Kai Roer

One of the most important elements of any security strategy is a culture of awareness.

Three experts ponder the question of how to deliver an effective internal awareness program for cybersecurity.

ENISA has published the most comprehensive and applicable recommendations and structure for setting up and running a successful security culture program.

Reports claim that 74% of breaches are down to insiders, or outsiders. Who is correct, and what does the reader learn?

If we are “down to people” to protect against phishing and ransomware, as is claimed by many security professionals in addition to Wombat, we should just give up the fight.

Technology continuously introduces huge amounts of security challenges and risk factors, which we keep blaming employees for not handling correctly. Blaming people for not handling poor technology correctly is - in my opinion - simply wrong.

The rise of cloud applications in the workplace is driving the need for companies to extend existing security policies to all devices and manage access to cloud applications.

Today's attackers employ a variety of deception tactics allowing them to impersonate legitimate users and bypass existing IT security defences.

As device proliferation, data privacy regulations, and enterprise data volumes continue to trend upward, enterprise risks around data compromise continue to be a growing concern. And these breaches are expensive, with fines and penalties for mishandling data privacy steeper than ever, as well as other intrinsic costs like brand damage. All organizations, regardless of the industry, need to ensure that their systems can protect sensitive information from improper exposure, while also enabling secure communication to their customers, clients and business partners. In this webinar we will: -Examine some noted recent data breaches and the cost and risk of such data exposure -Hear about the current changing regulator landscape around data breaches -Look at the impact of personal and portable devices in data security -Learn best practices for implementing encryption, to protect data without interrupting business