IT security is no longer just about applying technology, but about developing policies that govern how different parts of the organisation are secured. It is about how you plot a course for an open and agile enterprise in the face of threats that – if left unmanaged – can induce corporate sclerosis.
Related Stories
Cybersecurity
What the first 24 hours of a cyber incident should look like
The early stages following a cyber incident are arguably the most important. Here's how to manage it and learn from it
Cybersecurity
Anti-fragility – what is it and why should it be the goal for your organisation?
Organisations must be prepared to learn from the cyberattacks that they experience. That's where anti-fragility comes in
Cybersecurity
Cyber Action Plan and what it means for supply chains
The government has unleashed proposals for a Cyber Action Plan. It's still light on detail, but we outline how it could affect supply chains
Cybersecurity
Ransomware has evolved – so must our defences
Ransomware threats are advancing. Jamie Moles goes into what a triple extortion threat is and how to protect your organisation against them
Related Stories
Cybersecurity
What the first 24 hours of a cyber incident should look like
The early stages following a cyber incident are arguably the most important. Here's how to manage it and learn from it
Cybersecurity
Anti-fragility – what is it and why should it be the goal for your organisation?
Organisations must be prepared to learn from the cyberattacks that they experience. That's where anti-fragility comes in
Cybersecurity
Cyber Action Plan and what it means for supply chains
The government has unleashed proposals for a Cyber Action Plan. It's still light on detail, but we outline how it could affect supply chains
Cybersecurity
Ransomware payments to be banned – the unanswered questions
The government has announced a ban on ransomware payments from public sector organisations. We explore the loose ends to be tied






