By John Reed Stark2015-10-14T10:15:00
Though data breaches are inevitable, companies still remain too focused on fortification rather than response, failing to adopt to the harsh realities of rapidly emerging international and multifarious cyber-security threats. Inside, columnist John Reed Stark recommends a three-step cyber-security transformation for companies to undertake to combat recent rapidly evolving cyber-dangers.
You are not logged in and do not have access to members-only content.
If you are already a registered user or a member, SIGN IN now.
2015-12-08T09:00:00Z By John Reed Stark
Penetration testing is the exercise of testing a company’s cyber-security defenses, and finding the right “pen tester” to do that can be difficult. Learn how to find the right blend of capable, trustworthy, and innovative cyber-security professionals. More inside.
2026-04-02T19:12:00Z By Neil Hodge
The European Union’s key data privacy regulators have said that they support streamlining compliance and reporting requirements under plans to beef up cybersecurity across the 27-nation bloc.
2026-02-16T13:48:00Z By Trevor Treharne
Fragmented regulations across the APAC region are forcing compliance teams to rethink strategies that worked under GDPR.
Site powered by Webvision Cloud