Aug 23, 2022 | Cybersecurity & Risk Management, Technology, Transformation
Long gone are the days when mobile devices were the leading edge of modern technology. Nowadays, the convenience of mobile applications makes them practically required for seamless productivity in everyday tasks, both professional and personal. We have applications...
Jul 20, 2022 | Cybersecurity & Risk Management, Technology
Don’t forget to check out part one of our supply chain cybersecurity series on positioning your organization appropriately to deal with the challenges and part two on focusing your cybersecurity efforts. We live in an age of uncertainty and rapid...
Jul 14, 2022 | Cybersecurity & Risk Management, Technology
Here’s part two of our three-part series on supply chain cybersecurity. Be sure to check out part one on positioning your organization appropriately to deal with this challenge. And next week we’ll explore the particularly complex Maritime industry....
Jul 4, 2022 | Cybersecurity & Risk Management, Technology
Welcome to part one of our three-part series on supply chain cybersecurity. We’ll explore recent developments impacting the delivery of goods and services as well as how to focus your efforts to ensure ongoing cybersecurity within your logistics network. We will also...
Jun 15, 2022 | Technology, Cybersecurity & Risk Management
IT Asset Management (ITAM) is an important but often underappreciated process in which all information technology assets are documented, managed, and maintained in a controlled manner. Have your licenses or SSL certificates ever expired unexpectedly?...
Jun 10, 2022 | Cybersecurity & Risk Management, Technology
One of the age-old discussions in the realm of cybersecurity is the trade-off between security and usability. It is often said ‘a step forward in security is a step backward in usability’. While it is true cybersecurity will always require some level of...