Evolution of information security

July 1, 2016

During the last half of the century, digital security went a long way thanks to the great people who, most of the time, made their inventions free to use by anyone without being afraid of patent issues. 1961 First computer password Fernando Corbató MIT implemented the first password and username method of user authentification for time-sharing computer called CTSS. Cracked by Allan Scherr a Ph.D. researcher at MIT who was looking for a way to bump up his usage time on CTSS. He had been allotted four hours per week, but it wasn’t nearly enough time to run the detailed performance simulations he’d designed for the new computer system.

Spotlight

Great Bay Software

Great Bay Software is helping organizations gain back complete control over their corporate networks. Our technology, the Beacon product suite, solves the lack of endpoint visibility and control that keeps enterprises from fully securing their corporate network. No matter how large or complex the environment is, this technology will provide a comprehensive inventory with real-time contextual data about every single endpoint – what each one is, where it is located, whether it’s behaving as expected, and if it’s been authenticated. These robust insights are a powerful defense against network breaches.

Other Infographics
news image

The Importance of Active Directory Security Best Practices

Infographic | February 9, 2022

There’s no silver bullet solution to cybersecurity, a layered defense is the only viable defense. Active directory (AD) security best practicesare crucial because they are central to many vulnerable functions, such as Network access.

Read More
news image

Cyber Security Infographics

Infographic | May 4, 2021

Organisations know cyber security is a major risk; they depend on the Internet and IT systems to communicate with their customers, suppliers, partners and staff.Drawing on our experience in helping senior executives address the key governance and leadership issues around cyber threats, CGI’s Cyber Security Services team have developed a set of actions that senior business leaders can use to focus their organisations on cyber risk readiness.

Read More
news image

Cybersecurity for Small Businesses

Infographic | May 25, 2021

Small businesses often ignore security precautions. Sometimes it’s due to a lack of resources, other times it’s because they think hackers won’t care. On the contrary, 58% of all malware attacks are targeted at small businesses, because hackers know there is no proper security in place.

Read More
news image

Importance of Data Masking

Infographic | March 24, 2022

The Data Masking market was valued at USD 483.90 million in 2020 and is expected to reach USD 1044.93 million by 2026.

Read More
news image

Cyber Security Market

Infographic | January 11, 2022

The global cyber security market size is anticipated to reach USD 366.10 billion by 2028 and exhibit a CAGR of 12.0% during the forecast period. The surging number of e-commerce platforms and the growing integration of machine learning, internet-of-things (IoT), and cloud are expected to boost the market's growth.

Read More
news image

Cyber Security Checklist for 2019

Infographic | December 3, 2019

Over four in ten UK businesses(link is external) suffered a breach or attack during 2018-19, and 43% of cyber attacks are targeting small businesses(link is external). Use our easy to digest infographic to remind yourself and your staff of cyber security best practices, which have never been more important.

Read More

Spotlight

Great Bay Software

Great Bay Software is helping organizations gain back complete control over their corporate networks. Our technology, the Beacon product suite, solves the lack of endpoint visibility and control that keeps enterprises from fully securing their corporate network. No matter how large or complex the environment is, this technology will provide a comprehensive inventory with real-time contextual data about every single endpoint – what each one is, where it is located, whether it’s behaving as expected, and if it’s been authenticated. These robust insights are a powerful defense against network breaches.

Events