
Cloud-Native Environments: a challenge for traditional cyber security practices
Blind trust is no longer enough in the era of GDPR. Clouds are those blurred…
thedigitaltransformationpeople.com
Blind trust is no longer enough in the era of GDPR. Clouds are those blurred…
thedigitaltransformationpeople.com
Now, more than ever, physical security is a huge issue for many organizations the world…
thedigitaltransformationpeople.com
One of the most vulnerable aspects of any data center lies with its physical infrastructure,…
thedigitaltransformationpeople.com
No longer just as an equation between risk appetite, compliance requirements and costs. The “When-Not-If” paradigm around…
thedigitaltransformationpeople.com
Cybersecurity fails because secure activity damages Big Data, and Big Data controls cybersecurity because of…
thedigitaltransformationpeople.com
Security basics should be part of any MVP. Period. After almost 5 years (at least)…
thedigitaltransformationpeople.com
Excessive complexity and lack of first line integration render many GRC metrics useless. Many CISOs…
thedigitaltransformationpeople.com
Key factors for boards and executive management to consider in 2019 around cyber security and…
thedigitaltransformationpeople.com
Simply throwing money at the problem is rarely the answer. Many CIOs and CISOs would…
thedigitaltransformationpeople.com
You no longer have the legitimate right to protest when someone uses your data. A…
thedigitaltransformationpeople.com
Another year, another crop of cybersecurity threats — as well as some familiar ones. Whether…
thedigitaltransformationpeople.com
Talent alienation is the biggest issue behind the cybersecurity management skills gap, but it shouldn’t be…
thedigitaltransformationpeople.com