Cyber security in the boardroom: UK plc at risk

Cyber security isn’t a new issue. At CGI we’ve been helping to protect the UK’s critical national infrastructure, government and some of the country’s largest companies for over 40 years – since the outset of computing. However, what certainly is new is the rapidly growing business dependence on networked systems and the Internet, coupled with the rapidly evolving cyber security threat landscape and the amount that is at stake for companies in today’s digital-first world. As companies focus on digitising every area of their operations from the supply-chain, to the back-office, to customer interaction, the potential for a cyber security breach grows exponentially.

Spotlight

Shasta Ventures

Shasta Ventures is a leading early-stage venture capital firm. At Shasta, we are committed to helping brilliant entrepreneurs build exceptional, customer-focused companies of lasting value for the digital age. Our investments include Anaplan, Apptio, Crittercism, H.BLOOM, Lithium, Mint.com, Nest, Nextdoor, Poppin, RelayRides, Simple, Smule, Spiceworks, TaskRabbit, Turn, Typesafe, ZEFR, Zenprise, and Zuora.

OTHER WHITEPAPERS
news image

Cyber Security for Business

whitePaper | December 17, 2019

At CGI, cyber security is part of everything we do. For more than 40 years, we have helped clients manage complex security challenges with a business focused approach – protecting what is most valuable to them. As our economy becomes even more digital in nature, securing our organisations against cyber-attacks and data breaches has become one of the most important business issues facing senior management.

Read More
news image

MEC security; Status of standards support and future evolutions

whitePaper | September 28, 2022

The present White Paper will focus on MEC (Multi-access Edge Computing) technologies and intends to explore security-related use cases and requirements with the aim of identifying aspects of security where the nature of edge computing results in insufficient industry approaches to cloud security. Edge computing environments are by nature characterized by a complex multi-vendor, multi-supplier, multi-stakeholder ecosystem of equipment including both HW and SW devices. Given this overall level of system heterogeneity, the areas of security, trust, and privacy are key topics for the edge environments. Finally, the advent of edge cloud federations and the presence of (far) edge devices, e.g., in Internet-ofThings environments, requires tackling MEC security with an end-to-end (E2E) approach by leveraging existing standards relevant in the area, as carefully selected to be applicable in edge computing systems.

Read More
news image

Cloud-native security practicesin IBM Cloud

whitePaper | December 15, 2019

IBM Cloud™ is IBM’s high-performing public cloud platform, with data centers around the world that deliver cloud computing options from infrastructure as a service (IaaS), platform as a service (PaaS) to software as a service (SaaS). Security is a fundamental design principle for our cloud platform with market-leading security capabilities enabled for regulatory workloads.

Read More
news image

Password Safe Cloud 22.2 Security Whitepaper

whitePaper | August 5, 2022

The purpose of this document is to help technically-oriented professionals understand the security-related value BeyondTrust can bring to their organization. BeyondTrust can help your support organization stay secure and compliant, while improving the efficiency and success of your organization with a better end-user support experience.

Read More
news image

Understanding Ransomware and Strategies to Defeat it

whitePaper | March 5, 2020

Held Hostage in Hollywood: In February 2016 the Hollywood Presbyterian Medical Center, in Los Angeles, paid a ransom of about US$17,000 to hackers who infiltrated and disabled its computer network with ransomware. The hospital paid the ransom of 40 Bitcoins (currently worth about $16,664) after a “network infiltration” began on February 5, when employees reported being unable to access the hospital’s network and electronic medical records system. “The malware locked access to certain computer systems and prevented us from sharing communications electronically,” said hospital CEO Allen Stefanek.

Read More
news image

Cisco Spaces – Privacy and Data Protection

whitePaper | December 2, 2022

Cisco Spaces is an indoor location services cloud platform that provides wireless customers with rich locationbased services, including location analytics, business insight, customer experience management, asset tracking, Bluetooth Low Energy (BLE) management, and API.

Read More

Spotlight

Shasta Ventures

Shasta Ventures is a leading early-stage venture capital firm. At Shasta, we are committed to helping brilliant entrepreneurs build exceptional, customer-focused companies of lasting value for the digital age. Our investments include Anaplan, Apptio, Crittercism, H.BLOOM, Lithium, Mint.com, Nest, Nextdoor, Poppin, RelayRides, Simple, Smule, Spiceworks, TaskRabbit, Turn, Typesafe, ZEFR, Zenprise, and Zuora.

Events