Tag: Risk

Staying Ahead in the Cyber Security Game: What Matters Now

Cyber security is center stage in the world today, thanks to almost continuous revelations about incidents and breaches. In this context of unpredictability and insecurity, organizations are redefining their approach to security, trying to find the...

What Is the Best Way to Respond to a DDoS Attack?

As data breaches continue to occur, cyber attackers have demonstrated enhanced technical sophistication in the area of distributed-denial-of-service (DDoS) attacks. DDoS accounted for more than 55% of the overall annual cybercrime costs per...

38 Million Reasons to use Cryptography for Business

The tools of encryption and key management can (and should) be applied at numerous layers of business to protect, isolate, and control data. The technology is well-know and standardized. It is predictable and manageable and in no-way should be...

Software Security in the Supply Chain

This is a weekly post where we address questions of interest to the Application Information Security Community. What is the importance of software security in supply chain management?