Cybercrime is a lucrative business. Those without sufficient backups are forced to choose between paying the ransom or suffering the loss of data. When considering a cyber-resilient strategy, Eric Vanderburg, Vice President of Cybersecuirty at TCDI, assets it must include these three key components.
While blockchain and cryptocurrencies are dramatically reshaping global commerce, government intervention is sowing confusion and uncertainty regarding the future of these digital forms of exchange. Regulations are inevitable, but what should backers and investors do in the current climate to stay on the right side of the law?
People give up massive amounts personal data every day – to their phone apps, their doctors and their GPS systems. In theory, it’s anonymous but artificial intelligence is smart enough to correlate data and draw conclusions, so how much privacy do we really have?
Before we worry about teaching ethical decision-making to robots, we need to figure out how to teach it to the people who build them. Explore the approach that universities like Stanford, MIT, and Harvard are taking to cultivate an understanding of ethical issues in their students, and how this can benefit the companies that may one day employ them.
In cyber security, new threats and vulnerabilities appear at break-neck speed – faster than any one security team or analyst can manage. As new technologies create opportunities to innovate and streamline, businesses must weigh the benefits against the associated security risks. Explore what risks companies should be preparing for, and the trends security teams need to embrace to manage digital risk.
Social media is an enabler for business, but it also presents a growing digital risk to consumer-facing organizations because the global rise in popularity of social media platforms has lured fraudsters to expand their activities to the virtual world. Take a look at the six reasons why cyber criminals love social media.