This Week's Online-Exclusive Feature
Book Review: Information Governance: Concepts, Strategies and Best Practices
13 May 2015
Upesh Parekh, CISA
“By 2016, one in five chief information officers in regulation industries will be fired from their job for a failed information governance (IG) initiative.” If this quote does not jolt the reader of Information Governance: Concepts, Strategies and Best Practices out of any doubt about the importance of information governance, then what will?
Like many predictions made in this dynamic information era, some may challenge this as an exaggeration. But the information provided in Information Governance: Concepts, Strategies and Best Practices may make this suggestion appear to be an understatement. Read MoreIndicates Online-Exclusive Content
This Week's Featured Author Blog
APT and Social Engineering: With New Threats Come New Assessment Methodologies
18 May 2015
During the last few years, companies have evolved exponentially through the adoption of new technologies, devices and habits that allow them to improve the business from one side, but also to be more vulnerable to cyberattacks from the other. As the attack surface expands and cyberattacks evolve using different techniques and vectors, companies need to adapt their assessment methodologies, going beyond the traditional vulnerability and malware identification or data loss prevention.
For example, consider advanced persistent threats (APT). They are probably the most dangerous threats. They target specific companies and rely on social engineering as the main vector to gain access to inner information and communications technology (ICT) systems. In order to face these threats, companies should start considering possible tools or methodologies to evaluate their risk and the real extent of their exposure. Read More Indicates Online-Exclusive Content
What's New for Nonmembers