Tag: ICT/IT

T

This is how to prepare for a cyber attack

Cybersecurity is only in the spotlight when it fails. After high-profile, large-scale data breaches, it takes a beating. But cybersecurity provides critical layers of infrastructure in our modern, cyber-dependent society. Rehearsing for potential failures is always worthwhile. Executives tend to relegate cybersecurity to the IT department. That is a mistake, because cyber incidents affect the entire organization. We should conduct regular cybersecurity drills, as we do fire and safety drills. That’s where tabletop exercises can play a big role. At last month’s Cyber3 Conference Tokyo 2017, international stakeholders from academia, industry, government and civil society gathered at Keio University for

C

Cybersecurity lessons for 2020 and beyond

Good cybersecurity has tremendous potential to improve society, business and services we use every day. Because of its very nature, though, it involves discussion of bad actors and defensive measures, which can easily skew public perception. Indeed, big breaches seem to be occurring more and more frequently, and the bad guys are always in the headlines, making it all the more important to pause and take stock of the situation. In October, international stakeholders from academia, industry and government gathered in Japan for the third annual Cyber3 Conference Tokyo 2017. The two-day event was held at Keio University in conjunction

C

Cyberattacks Are Inevitable — Until We Stop Playing The Blame Game

As organizations around the world begin to take cybersecurity threats more seriously, large-scale attacks like the recent breach of a major credit reporting agency seem to be happening more frequently. At the same time, there’s increased focus on who’s responsible for security vulnerabilities. The aforementioned Equifax attack exposed the personal data of as many as 143 million Americans, triggered a lawsuit by the state of Massachusetts as well as at least 50 class-action suits, Federal Trade Commission and FBI investigations and questions from a Senate oversight committee. Also in September, one of the world’s largest accounting firms was hit by

9

9 Factors To Ensure Your Cybersecurity Policy Works For Your Staff, Not Against Them

Companies and organizations are still struggling to deal with ransomware, a cyberattack in which user data is encrypted and held hostage, supposedly until a ransom is paid. This trend looks set to continue and perhaps even intensify. I often get asked by executive management about what they should be doing and what questions they need to be asking. Those questions can be a useful guide for those who aren’t sure if they’re doing enough beyond asking the IT department to take care of it. Instead of the usual spiel about what equipment to purchase or what software to install, I

T

This is what will keep us human in the age of AI

Artificial intelligence (AI) is making speedy progress in acquiring skills that were previously regarded as exclusively human. Whether it’s beating masters at the ancient game of Go or getting better and better at autonomous driving, the many emerging forms of computer intelligence are giving us pause as a species. AI is real and it’s the next big thing in our social evolution. Even if you don’t believe in the singularity — the theoretical point at which AI will outstrip all human intelligence — it’s undeniable that AI is playing an increasing role in our everyday lives, from serving up search results, car navigating, suggesting

Do NOT follow this link or you will be banned from the site!