The Public Private Partnership (PPP) concept and implementation has been widely endorsed and increasingly employed throughout the world for...
Archive for category: Operational Efficiencies
Operational Efficiencies
Design Thinking… What is That?
SEC Intelligence Editor - Britta Schmidt, , Business, Operational Efficiencies, Thought, Design Thinking, 0The methodology commonly referred to as design thinking is a proven and repeatable problem-solving protocol that any business or...
Diving Deeper to Understand, Investigate and Mitigate Cyberthreats
SEC Intelligence Editor - Britta Schmidt, , Cybersecurity, Infrastructure, Operational Efficiencies, Critical Infrastructure, CyberSec, cybersecurity, Cyberthreats, Infrastructure, IT Security, 0As recent attacks targeting sensitive, personal information at a number of high-profile institutions have demonstrated, it is not a...
Southeast Asia: An Evolving Cyber Threat Landscape
SEC Intelligence Editor - Britta Schmidt, , Cybersecurity, Infrastructure, Operational Efficiencies, PPP, Security, Critical Infrastructure, cybersecurity, FireEye, Industrial IoT, risk analysis, SCADA, Southeast Asia, 0Southeast Asia: An Evolving Cyber Threat Landscape This report by Fireeye Threat Intelligence from March 2015 describes malware detected...
AT&T Cybersecurity Insights Report 2016: The CEO’s Guide to Securing the Internet of Things – Exploring IoT Security
SEC Intelligence Editor - Britta Schmidt, , Cybersecurity, Infrastructure, Operational Efficiencies, AT&T Cybersecurity Insights Report, Industrial IoT, intelligent sensors, Internet of Things, Securing the Internet of Things, 0AT&T Cybersecurity Insights Report 2016 – The CEO’s Guide to Securing the Internet of Things – Exploring IoT Security...
Verizon’s 2016 Data Breach Investigations Report finds cybercriminals are exploiting human nature
SEC Intelligence Editor - Britta Schmidt, , Cybersecurity, Infrastructure, Operational Efficiencies, Security, Critical Infrastructure, Cybercriminals, cybersecurity, Data Breach Investigations Report, DBIR, DBIR 2016, Financial Services, Global Networks, Healthcare, Hospitality, Industrial IoT, Infrastructure, Innovation, IoT, Managed Security, Public Sector, Research and Reports, Retail, risk analysis, Smart Cities, Smart City, Technology, Verizon 2016 Data Breach Investigations Report, Verizon Networks, 0Verizon’s 2016 Data Breach Investigations Report finds cybercriminals are exploiting human nature Cybercriminals are continuing to exploit human nature...
Symantec 2016 Internet Security Threat Report
SEC Intelligence Editor - Britta Schmidt, , Cybersecurity, Infrastructure, Operational Efficiencies, Security, Cyber scammers, cyberattacks, cybersecurity, Data Breach Investigations Report, Ransomware, risk analysis, Spear-Phishing Campaigns, Symantec 2016 Internet Security Threat Report, Symantec ISTR, Vulnerabilities, Zero-Day Vulnerability, 0Symantec 2016 Internet Security Threat Report The 2016 Internet Security Threat Report (ISTR) provides an overview and analysis of...
McAfee Labs 2016 Threats Predictions Report Forecasts Changes
SEC Intelligence Editor - Britta Schmidt, , Cybersecurity, Infrastructure, Operational Efficiencies, Security, detection evasion, espionage malware, firmware, IT security industry, McAfee Labs 2016 Threats Predictions Report, threat landscape, 0McAfee Labs 2016 Threats Predictions Report Forecasts Changes The report illustrates an ever-evolving threat landscape, in which applications and...
IBM 2016 Cyber Security Intelligence Index – Serious data breaches, major attacks and new vulnerabilities
SEC Intelligence Editor - Britta Schmidt, , Cybersecurity, Energy, Infrastructure, Operational Efficiencies, Security, Cyber Security Intelligence, cybersecurity threats, IBM 2016 Cyber Security Intelligence Index, IBM X-Force, security threats, 0IBM 2016 Cyber Security Intelligence Index – Serious data breaches, major attacks and new vulnerabilities Understand the threat landscape...
Google Security – Android Security 2015 Annual Report
SEC Intelligence Editor - Britta Schmidt, , Cybersecurity, Infrastructure, Operational Efficiencies, Security, Android Security, Chrome Android Safe Browsing, cybersecurity, Google Android Security Annual Report, machine learning, PHA, Potentially Harmful Apps, risk analysis, vulnerable endpoints, 0Google Security – Android Security 2015 Annual Report Enhancing Google’s services to protect Android users In the last year,...
Featured Articles
- Industrial network security best practice advice December 15, 2021
- Industrial Processes Move to the Cloud November 15, 2021
- Cloud-based software solutions for industrial applications October 15, 2021
- 3 Keys to Securing Converged IT/OT Environments September 15, 2021
- ICS SCADA With Secure Clouds August 15, 2021