
Knee-Jerk Reactions to Data Breaches are damaging the case for Cyber Security
Cyber Security Transformation is not about implementing yet another technology product. Anybody who has spent…
thedigitaltransformationpeople.com
Cyber Security Transformation is not about implementing yet another technology product. Anybody who has spent…
thedigitaltransformationpeople.com
It's Bug Bounties! The former was a super successful bug bounty program run by the US…
thedigitaltransformationpeople.com
Cyber threats are a reality for most organisations. However, misconceptions and misunderstandings about the true…
thedigitaltransformationpeople.com
Cyber threats are a growing concern for most organisations. However, it appears that reactive, expensive…
thedigitaltransformationpeople.com
Compliance and audit-oriented “tick-in-the-box” practices are still underpinning many InfoSec strategies. Huge sums of money…
thedigitaltransformationpeople.com
The past few years have seen the convergence of a number of technology streams accelerating:…
thedigitaltransformationpeople.com
First things first: an apology. That headline is deliberately provocative. Of course security will always…
thedigitaltransformationpeople.com
Blockchain Technology is the new technology innovation in market which has started creating lots of noise…
thedigitaltransformationpeople.com
The Brexit shock continues to reverberate throughout the global economic and policy worlds. Despite protests…
thedigitaltransformationpeople.com
Google Dorking is the new powerful hacker's aid seen in the latest cyber attacks this…
thedigitaltransformationpeople.com
Cyber Attacks are alarmingly increasing; according to a new report, titled "Anatomy of an Attack—Medical…
thedigitaltransformationpeople.com