Cyber Insurance and Incident Response – Essential Part of every Business Continuity Strategy

A study by UK Government (HM Goverment, 2015) estimated that 81% of large corporations and around 60% of small corporations suffered from cyber breaches in 2014 across various business sector in London and South-East England. For Germany and Central Europe, (Andreas Schmitz , 2016) shows that security incidents rose by a staggering 38% in 2015. The typical loss from the cyber breaches are data loss, outage, physical damage, privacy issues etc. In any kind, the organization suffers financially and/or a brand is damaged. It is…

Why Real Estate Organizations Should Care About Artificial Intelligence and Robotic Process Automation

Artificial intelligence (AI), particularly in combination with process automation, is a powerful technology which will, and has already begun to change industries. When hearing the term AI, most people probably think of recommendation algorithms, about search results, about chatbots, etc. In short, we think about consumer-focused products. But AI is also starting to rapidly spread into business-focused solutions. Going forward, AI solutions will move far beyond commercial, nice to have solutions, and focus more on adding true value, also for large corporations and businesses. Real…

Save heaven for Mac OS users? Unmasking the Security Myth

“I do not need antivirus software because I am using an Apple Mac!” This unsuspecting view has been far spread till very short time ago. Contrasting to this, we hear in everyday news how many threats are looming to windows OS to steal, modify or simply destroy our data (for example here, in German). Is it really that easy that you can simply avoid any malware by switching to Mac OS and live an easy life? Now, IBM plans to switch from Windows to Apple…

How to Streamline and Integrate Security Operations?

Today’s security teams are flooded with multiple feeds of information and analytical methods. In parallel, attackers make use of various vulnerabilities and continuously target critical business services, infrastructure and employees. In order to accomplish and manage appropriate protection, security and IT operations must work closely together. However, many have a dependence on manual processes, separate silo teams and systems which impacts the security team’s efficiency and effectiveness. Typically enterprises have diverse operation centers or teams e.g. NOC, SOC or IT operations requiring firstly a set of shared…

Do ‘Know Your Customer’ programs really work?

“Know me? No? It’s me!” Every time I walk into an establishment where I hold some sort of loyalty card, I wonder if “they” really “know me.” That got me to thinking about Know Your Customer (KYC) programs. More and more, financial institutions are performing KYC, not to really get to know you, but to check off that they followed yet another mechanical process. Recently, I ran into a very good friend of mine that I had lost touch with for almost 30 years. When we met…

Copyright 2017 21st CENTURY IT · RSS Feed · Anmelden