This site uses cookies to provide you with a more responsive and personalized service. By using this site you agree to our use of cookies. Please read our cookie notice for more information on the cookies we use and how to delete or block them.

Bookmark Email Print this page

    More

    Page   1/1   
  • Tech Trends 2014: Exponentials
    Exponentials represent unprecedented opportunities as well as existential threats. Explore five with far-reaching, transformative impact.
  • 3 ways CIOs can address crimeware-as-a-service
    Cyber crime is no longer the exclusive domain of computer prodigies.
    Crimeware-as-a-service, a term used to describe the many ready-made services available to execute a variety of cyber attacks, has made perpetrating cyber crime easier — and cheaper — than ever.
  • Cyber in the boardroom: Time for a Cyber Chair?
    While the true cost of cybercrime is not easy to tabulate, its impact is quickly drawing increased attention. As a result, Boards of Directors have a responsibility to take a more active role to ensure that management protects and maximizes the value of their digital assets both within and outside the company walls.
  • The next big ideas in cyber security
    To meet cyber challenges, CIOs are now deploying tools and strategies that support prevention, early detection and rapid response.
  • Risk Angles: Five questions on the evolution of cyber security
    This issue of Risk Angles discusses how an evolutionary approach to cyber security is key to staying ahead of cyber criminals — and the competition.
  • Cyber crime fighting
    Enterprises have to go on the offense to protect themselves from a rising tide of cyber crime. Collective intelligence and the application of human judgment supported by advanced security analytics can help.
  • Hitting back at hackers: Do two wrongs make a right?
    If your organization is hit by a cyber-attack, engaging authorities is the appropriate course of action. But, if you’re able to stop the attack yourself, should you hit back at the hackers?
  • Deloitte security consulting ranked #1 globally based on revenue
    Gartner has ranked Deloitte #1 globally in security consulting based on revenue in their Market Share Analysis: Security Consulting, Worldwide, 2012 report.
  • Evolve or fail
    With policies in place for technology governance, risk and compliance, many business leaders have assigned responsibility for security to IT, confident that their fiduciary and legal obligations are being met. But a compliance-oriented approach to enterprise and IT risk may overlook many of the threats that matter most.
  • 2012 Deloitte-NASCIO cybersecurity study
    The second biennial Deloitte-NASCIO Cybersecurity 2012 survey highlights the challenges that state enterprises and security personnel face in protecting the state’s critically important systems and data.
  • Page   1/1