Data breaches – a game of Russian roulette, carefully selected targets or exploiting the circumstances?
From a criminal viewpoint, cybercrime has grown into an international and profitable business, one among other business fields. Behind data breaches one can usually find hacker groups supported by authoritarian governments, independent criminal groups or individuals skilled in information technology who have fallen onto the wrong side of the law, whose day jobs involve scanning through corporate web interfaces for gaps the size of a single line of code or malware.
Are you up to date on how to protect yourself and your devices in the digital era? Cybersecurity is becoming increasingly important as hackers and social engineers constantly find new ways to operate and attack individuals as well as organizations. Therefore, we cannot risk being naive towards the threat of cyber attacks. After all; many […]
As a result of the ubiquitous, increasing events of hacking and security breaches, IBM has sought to provide an opportunity for companies to develop protection plans, should they be intruded. Therefore, IBM created The X-Force Command Cyber Tactical Operations Center (C-TOC) to help counter such cyberattacks, which we made a blog post about in November 2018. […]
IT security and cyber resiliency and has been an important IT priority for years in the Nordics. Because of the growing and ever-changing threat landscape, IT security and business continuity after an incident should be permanently on the agenda of boards and C-level management. All organizations need to create digital trust to stay relevant. The […]
A few years back I saw an entertaining show by Dietmar Dahmen. He reminded me about the fact that we have seen disruption in the evolution of which we have been part.The invention of the wheel, adding a horse in front of a wagon and later when the wagon turned into a car driven by […]