Cybersecurity Futures 2025

June 12, 2019

Cybersecurity, broadly defined, is the master problem of the Internet era The problem set is evolving more quickly than is our understanding of it (and our ability to ‘solve’) Different countries and industries will grapple with these challenges in different ways Gaining foresight into those differences enables us to tilt the digital world in a direction that is more secure and beneficial to people and societies.

Spotlight

Adaptive Systems Inc

Adaptive Systems Inc is a consulting firm focused data security for unstructured & structured data. Why care about unstructured data? Many companies realize they have thousands of documents in file shares (SharePoint) and no idea who within the company has access to them! User Access Control/Permission Visibility should be one of the first things a company should do -- you may discover hundreds of users that no longer work at your company but they are still active users and may still have access to your sensitive unstructured data (file shares and NAS).

OTHER WHITEPAPERS
news image

Cybersecurity 2018

whitePaper | February 2, 2020

Small businesses usually neglect cybersecurity as an essential function making their IT infrastructure vulnerable. IT security issues often cost companies a lot of money and downtime every year. Even if the IT infrastructure consists of couple laptops and Devices, cybersecurity should always be a top priority.

Read More
news image

How to Reduce the Risk of Phishing and Ransomware

whitePaper | March 21, 2021

Cybersecurity challenges abound for organizations across the world. The tsunami of phishing attacks that threaten account compromise, data breaches and malware infection remains a critical threat to neutralize. Ransomware is a second critical threat, with a well-played ransomware attack capable of bringing an organization to a complete halt, and in some cases putting it out of business permanently (e.g., Travelex1 and Vastaamo2.

Read More
news image

Dashlane - Security White Paper August 2022

whitePaper | August 30, 2022

Access to the user’s data requires using the User Master Password which is only known by the user. It is used to generate the symmetric Advanced Encryption Standard(AES) 256-bit key for encryption and decryption of the user’s personal data on the user’s device. We useWebcrypto API for most browser based cryptography and the native libraries for IOS and Android.

Read More
news image

Managing the IT Modernization Elephant A bite-sized approach to digital modernization

whitePaper | June 15, 2022

There’s an old saying, “How do you eat an elephant? One bite at a time.” In some cases, the task of technology modernization is akin to eating an elephant. Government agencies are filled with legacy applications, many of which have been heavily customized over decades of operation.

Read More
news image

Application Security in a Multi-Cloud World

whitePaper | October 18, 2022

In the mad dash to the cloud, organizations have turned their application environments into a miscellaneous mess. Whether it be private, public or on-premise, organizations are leveraging heterogenous application hosting environments as they transition to the next phase of cloud computing: The multi-cloud.

Read More
news image

Cloud-native security practicesin IBM Cloud

whitePaper | December 15, 2019

IBM Cloud™ is IBM’s high-performing public cloud platform, with data centers around the world that deliver cloud computing options from infrastructure as a service (IaaS), platform as a service (PaaS) to software as a service (SaaS). Security is a fundamental design principle for our cloud platform with market-leading security capabilities enabled for regulatory workloads.

Read More

Spotlight

Adaptive Systems Inc

Adaptive Systems Inc is a consulting firm focused data security for unstructured & structured data. Why care about unstructured data? Many companies realize they have thousands of documents in file shares (SharePoint) and no idea who within the company has access to them! User Access Control/Permission Visibility should be one of the first things a company should do -- you may discover hundreds of users that no longer work at your company but they are still active users and may still have access to your sensitive unstructured data (file shares and NAS).

Events