Process Archives -TEISS® : Cracking Cyber Security

Category: Process

The four pillars of crisis management

Author: webeditor

Chris Huggett, Senior Vice President, EMEA & India at Sungard AS says that businesses must take stock of their vulnerabilities and put into place a plan of action to be executed in a crisis. Today’s IT-driven business world has re-defined the... Read more

How to secure your move to the multi-cloud

Author: webeditor

Moving to a multi-cloud environment requires an appropriate security approach to ensure your data, applications, and systems stay protected. Steve Armstrong, Regional Sales Director of UK & Ireland at Bitglass, highlights five ways to maximise your security posture in the... Read more

What can Snoopy teach us about security?

Author: Keil Hubert

Good security depends on people responding properly to a wide range of cyber threats. To train people effectively, you first need some nuanced understanding about how and why people react strangely – or don’t react – to sudden treats. For... Read more

How well do you really know your company’s culture?

Author: Keil Hubert

Every organisational culture has unwritten rules for How Things Are Done. Leaders and trainers need to understand their own culture so that they can help new hires upgrade the ingrained habits and understandings that they’ve unconsciously carried forward from previous... Read more

Big data, graph, and the cloud: 3 keys to stopping today’s threats

Author: webeditor

Scott Taschler, CrowdStrike’s Director of Product Marketing, outlines the role Graph technology plays in the modern enterprise security arsenal Graph databases are having a bit of a moment in cybersecurity. With recent releases from industry juggernauts such as Microsoft and Google/VirusTotal,... Read more

Go slow to go fast with digital transformation

Author: webeditor

Matt Klassen, VP Product Marketing, Cherwell Software shows us how applying brakes can lead to greater speed in the longterm. The last few years have seen the concept of digital transformation shift from being the approach of leading edge market... Read more

Data security: how to keep the investors happy

Data security: how to keep the investors happy

Author: webeditor

Jake Moore, cyber security specialist at ESET, says that instead of leaving investors and the public in the dark, it’s time that companies showed more transparency about how they secure our data. Data, according to some industry commentators, is now... Read more

Get the latest cyber news in your inbox

Join our community of cyber professionals today!