Cybersecurity

Showing 1-20 of 23

The Uncertain Status of Gig Work

Many workers value the flexibility and income that gig work provides; customers like being able to find people to do things they want done. However, the extent to which gig workers, typically self-employed individuals, should be afforded the legal rights of employees has yet to be fully resolved in many jurisdictions.

What Cloud Localization Means for Organizations

In the world of cloud computing, the spotlight has mostly been on cloud providers and their ability to help organizations digitally transform. With new scrutiny around data localization and privacy, enterprises must consider localization impacts on their cloud computing strategy as they invest and innovate with emerging technologies.

Is Your Company Ready for a Cyberattack?

Increasingly, military-inspired exercises are becoming standard elements of corporate risk mitigation and resiliency efforts. They include tabletop exercises,” designed to help executives envision how they would handle different risk scenarios; “red team exercises,” designed to ferret out weaknesses through contained attacks conducted internally to see how cybersecurity teams respond; and engaging ethical hackers to test the organization’s cybersecurity defenses.

The Trouble With Cybersecurity Management

To better prepare for growing cyber threats, organizations and managers must build awareness about the complexity of cybersecurity and adopt training programs that mimic real-world scenarios. One option is “management flight simulators” that let experienced and novice managers run simulations to learn how to respond to cyberattacks.

advertisement

Digital Transformation Opens New Questions — and New Problems to Solve

Modest questions about how today’s problems could be solved more effectively lead to applications of technology with easily foreseeable gains. But when people start asking bigger, bolder questions that challenge basic assumptions about how a problem has been framed, they open up space for breakthrough innovations. That’s been the pattern in many digital realms, including cybersecurity, artificial intelligence, and the internet of things.

Your Customers May Be the Weakest Link in Your Data Privacy Defenses

  • Blog
  • Read Time: 5 min 

Many ethical, lawfully managed businesses have consumer data they aren’t legally authorized to possess, obtained from a surprising source: their customers, who inadvertently share the personal data of family, friends, and colleagues. And in the wake of the Cambridge Analytica scandal and the enactment of the EU’s General Data Protection Regulation, peer-dependent privacy is emerging as a critical consideration for businesses.

Why Businesses and Governments Need to Stop Trying to Secure Their Networks

Moving to a zero-trust network, where all the services an organization needs are hosted in the cloud, is the most secure IT option. Most network breaches are caused by human error: People forget their laptops in bathrooms and cabs, connect to insecure public Wi-Fi, click on emails they shouldn’t, and download attachments carrying malware. The only way to manage this threat is to dismantle the privileged intranet and treat every login as a potential threat.

advertisement

advertisement

To Improve Cybersecurity, Think Like a Hacker

To protect their organizations from cyberthreats, companies need to understand how hackers go about their work. The authors’ research suggests that hackers’ attacks typically involve four steps: identifying vulnerabilities; scanning and testing; gaining access; and maintaining access.

What Executives Get Wrong About Cybersecurity

Cyberattacks are in the news. All kinds of organizations — ranging from Target Corp. and Bangladesh Bank to the Democratic National Committee in the United States — have fallen victim to them in recent years. MIT cybersecurity expert Stuart Madnick explains some of the biggest cybersecurity risks businesses face today — and what executives should do to decrease their companies’ vulnerabilities.

How “Smart” Is Your R&D Spending?

What’s happening this week at the intersection of management and technology: Getting “smart” with R&D spending; foiling the script kiddies; the quest for permanent agility.

Showing 1-20 of 23