Zero trust: A business imperative for the digital age

Zero trust: A business imperative for the digital age

In today’s digital world, enterprises face unprecedented cyber threats from sophisticated actors who exploit the vulnerabilities of a complex and dynamic IT environment. As organizations adopt cloud computing, artificial intelligence and other emerging technologies to enhance their business capabilities and competitiveness, they also expose themselves to new attack vectors and risks.  According to a report by IBM, the global average cost of a data breach in 2024 — a 10% increase over last year and…

Read More

Only 5% of business leaders report seamless connectivity

Only 5% of business leaders report seamless connectivity

A survey of 500 enterprise leaders across six countries (United States, United Kingdom, Germany, Japan, Canada and Australia) highlights the relationship between connectivity and cybersecurity. The research asserts that better connectivity improves an organization’s chances of defending against cyberattacks, as 38% of organizations with excellent connectivity are among industry leaders for cybersecurity performance. When an organization has good connectivity, only 22% are considered industry leaders.  However, only 5% of business leaders report seamless connectivity across…

Read More

When Cyber Security Breaches Are Inevitable, It’s Time To Call For A New Approach

When Cyber Security Breaches Are Inevitable, It’s Time To Call For A New Approach

We need to do more than deflect cyberattacks: we need to build the capacity to sustain business … [+] operations during and after a cyberattack. getty At the TED Conference in Vancouver this year, our Radical Innovators foundation hosted a forum with more than 60 of the world’s top CHROs, CIOs, and founders. On the agenda: how new technologies like AI and quantum computing can elevate our human experience, transforming how we work and live…

Read More

Calling for backup: The importance of disaster recovery

Calling for backup: The importance of disaster recovery

These days, everyone knows the importance of backing up their data. Everything needs to be backed up — from a laptop to the cloud platform on which many businesses rely. It feels fairly simple.  Unfortunately, with bad actors finding new ways to attack businesses every day, nothing is ever that easy. Threat actors know good backups are the cheat code to not paying the ransomware, giving victims the ability to rewind the clock to before…

Read More

Our Shared Responsibility: Africa's Cybersecurity Imperative

Our Shared Responsibility: Africa's Cybersecurity Imperative

Globalization and digitization have made our world progressively interconnected, and as the promise of AI is realized around the world, so are accompanying threats. Cybersecurity stands as a critical pillar for economic stability and growth, reaching across borders and touching every aspect of our global community, but Cisco’s Cybersecurity Readiness Index reveals a sobering truth: that a mere 3% of global organizations are ready to address contemporary risks across the full spectrum of cybersecurity solutions. As…

Read More

European Cyber Resilience: How the EU Can Patch the Weak Spots in its Collective Armour

European Cyber Resilience: How the EU Can Patch the Weak Spots in its Collective Armour

In the thrust and parry of cyber resilience, the European Union (EU) has forged a legal framework made of many pieces to fortify its digital defences. Yet, there remain two clear weak spots in Europe’s collective armour: the presence of unsupported connected devices within critical infrastructure networks and the opacity surrounding the handling of newly discovered, or obtained, vulnerabilities by government agencies. In this blog, I delve into these two crucial issues for EU policymakers…

Read More

Rebooting Europe’s Sustainable Growth and Connectivity with Cisco’s Policy Roadmap

Rebooting Europe’s Sustainable Growth and Connectivity with Cisco’s Policy Roadmap

On Sunday, like 185 million of my fellow European citizens, I headed to my local polling station to vote in the European elections. As the banners come down, and the corks and confetti are swept up, the buzz of campaigning will now shift to practical policy making. When our elected MEPs (Members of the European Parliament) head to Strasbourg for their first session in July, over half of them will be newcomers. The beginning of…

Read More

The intersection of public health and security

The intersection of public health and security

The intersection of public health and security | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Benchmarking is the missing link to cyber resilience

Benchmarking is the missing link to cyber resilience

Benchmarking is the missing link to cyber resilience | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

SAP cyber resilience is not a one-and-done procedure

SAP cyber resilience is not a one-and-done procedure

SAP cyber resilience is not a one-and-done procedure | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More
1 2 3