Data.” Ask senior management at any major organization to name their most critical business asset and they’ll likely respond with that one word. As such, developing a disaster recovery strategy – both for data backup and restoration – is a central part of planning for business continuity management at any organization. It is essential that […]
How do you pick up a malicious online virus, the kind of malware that snoops on your data and taps your bank account? Often, it’s through simple things you do each day without thinking twice. James Lyne reminds us that it’s not only the NSA that’s watching us, but ever-more-sophisticated cybercriminals, who exploit both weak […]
Hacking, fake news, information bubbles … all these and more have become part of the vernacular in recent years. But as cyberspace analyst Laura Galante describes in this alarming talk, the real target of anyone looking to influence geopolitics is dastardly simple: it’s you.