Security As A Service: Do You Get the Service You Expected? (Part 2/2)

Following the first article about why organizations should outsource security services, in this post I would like to address some further considerations. Adding external IT service providers to your company’s IT service portfolio requires a lot more considerations and arrangements.  It is not the intension of this article to be comprehensive in this regards, because many aspects are outside the information security scope.   Therefore the below covers just a few more but important action items when searching for a new security service provider.

Security As A Service: Do You Get the Service You Expected? (Part 1/2)

This article takes you on a comprehensive tour de force of Managed Security Services (MSS). Learn why organizations outsource security services, how they select providers, how the two sides work together and where the pitfalls are even when all necessary steps were taken to ensure a successful project/service.

Cyber Insurance: State of Play

Cyber risks are real and are constantly evolving with technological advances and pervasiveness. Whether individuals, small business or multi-national – all might face a Cyber incident that can result in costly financial consequences. In times of heavy competition in classic insurance products and negative interest rate headwinds limiting returns from insurer’s bond portfolios, Cyber risks present a major opportunity for the insurance industry. With annual growth rates of up to 100%, global Cyber insurance market size predictions for 2025 range between $ 10 to 20+…

When the Cryptolocker Strikes – Reasons for Success of Ransomware

It was at a public sector customer’s site when our shared project mail account received a quite legitimate-looking email with an invoice in a .docm document and a request to verify its contents. The sender seemed to be a lady employed at the customer’s organization. But at second look, something was wrong with it. She was not employed here nor has she ever been. I showed it around the project team and we quickly got very skeptical, deleting it. According to the information security staff…

The State and Future of Cyber Extortion & IT Hijacking for Ransom

Authors: Dr. Alexander Schellong, Wolfgang Kiener Hijacking and ransom payments. It is something associated with war zones, poor countries such as Somalia and their pirates, crime syndicates or Hollywood movies. Think again. The digital transformation brings it closer to home. Everybody needs to understand this growing Cyber threat of #ITnapping for ransom.

Copyright 2016 21st CENTURY IT · RSS Feed · Anmelden