Information Security Policy

"Information security and management is an integral part of IT governance, which in turn is a keystone of corporate governance. Information is an asset, and like other important business assets, it has a value and consequently needs to be suitably protected. A comprehensive information security management system protects information  from a wide range of threats in order to ensure business continuity, minimise business damage and maximise return on investments and business opportunities. This is the British Library’s high level Information Security Policy, part of the Library’s
Information Risk Management Framework. The principles described in this policy provide
direction for the more detailed processes, procedures and guidelines that are referenced.
"

Spotlight

HexaTier

Established in 2009, HexaTier offers greater database security and compliance in the cloud, on-premise and on Database as a Service (DBaaS) platforms with its unified solution that provides database security, dynamic data masking, database activity monitoring and discovery of sensitive data. Utilizing purpose-built, patented Database Reverse Proxy technology, the company protects against both internal and external security threats. Backed by leading investors such as JVP, Magma VC and Rhodium, HexaTier is the first and only company worldwide to provide security for cloud-hosted databases and DBaaS platforms through a streamlined and simple solution. Headquartered in Tel Aviv with offices in Irvine, CA and Boston, MA, HexaTier secures databases for nearly 200 organizations globally.

OTHER WHITEPAPERS
news image

What Is a Value Chain for Security

whitePaper | November 15, 2019

Cisco has architected and deploys a capability that continually assesses, monitors, and improves the security of our value chain throughout the entire lifecycle of our solutions.

Read More
news image

AI Security White Paper

whitePaper | January 23, 2020

With the accumulation of big data, dramatic improvements in computing power, and continuous innovation in Machine Learning (ML) methods, Artificial Intelligence (AI) technologies such as image recognition, voice recognition, and natural language processing have become ubiquitous. Meanwhile, AI poses a significant impact on computer security: on the one hand, AI can be used to build defensive systems such as malware and network attack detection; on the other hand, AI might be exploited to launch more effective attacks.

Read More
news image

Cyber Security for Business

whitePaper | December 17, 2019

At CGI, cyber security is part of everything we do. For more than 40 years, we have helped clients manage complex security challenges with a business focused approach – protecting what is most valuable to them. As our economy becomes even more digital in nature, securing our organisations against cyber-attacks and data breaches has become one of the most important business issues facing senior management.

Read More
news image

2023 Data Protection Trends Executive Brief United States Edition

whitePaper | February 8, 2023

In late 2022, an independent research firm completed their survey of 4,200 unbiased IT leaders and implementers on a variety of data protection drivers, challenges, and strategies — including 1175 in United States. This broad-based market study on unbiased organizations is conducted annually on Veeam’s behalf to understand how the data protection market continues to evolve, so that Veeam can ensure product strategies and market initiatives align with where the market is going.

Read More
news image

Threat Connect Cyber Survey Report

whitePaper | January 4, 2022

Whether you are in financial services, farming, or public infrastructure, the security threat to organizations has never been greater. Today, almost every company is a technology company in some shape or form and this can be a soft underbelly - open to attack. Cyber risk is the fastest-growing risk faced by businesses globally. A wide range of statistics and sources make it clear that attackers have become even more proficient over recent years, using automation to exploit vulnerabilities at an accelerated pace and frequency. Threats are even more widespread and complex than before.

Read More
news image

Cyber Security in the AC500 PLC family

whitePaper | February 7, 2023

ABB offers a comprehensive range of scalable PLCs and robust HMI control panels. Since its launch in 2006, the AC500 PLC platform has achieved significant industry recognition for delivering high performance, quality and reliability. Cyber Security has become of key importance for ABB customers and ABB alike. In order to help protect ABB customers as well as our brand, cyber security must be an important aspect in our products, systems, projects and service deliveries.

Read More

Spotlight

HexaTier

Established in 2009, HexaTier offers greater database security and compliance in the cloud, on-premise and on Database as a Service (DBaaS) platforms with its unified solution that provides database security, dynamic data masking, database activity monitoring and discovery of sensitive data. Utilizing purpose-built, patented Database Reverse Proxy technology, the company protects against both internal and external security threats. Backed by leading investors such as JVP, Magma VC and Rhodium, HexaTier is the first and only company worldwide to provide security for cloud-hosted databases and DBaaS platforms through a streamlined and simple solution. Headquartered in Tel Aviv with offices in Irvine, CA and Boston, MA, HexaTier secures databases for nearly 200 organizations globally.

Events