Maar executives schrikken er vaak voor terug om
informatie buiten de onderneming te verplaatsen.
Zij geloven - ten onrechte - dat hun IT-personeel het
beste in staat is om gevoelige informatie te beveiligen.
Voor een succesvolle toekomst moeten CIO’s hun
op beveiliging (on-premise is het beste) laten varen,
en het beheer van hun belangrijkste applicaties overdragen
aan een cloudprovider.
Published By: Darktrace
Published Date: Jun 21, 2019
Cyber-attacks targeting technology and telecommunications firms represent the most significant threat to their sensitive customer data and invaluable intellectual property. When successful, such attacks cost these firms dearly, not only in terms of immediate loss of revenue but also in the form of subsequent reputational damage.
Technology firms that provide digital services or house vast quantities of user information are particularly at risk, as demonstrated in the Uber breach that exposed the personal information of more than 25 million users. Regulations around personal data, such as GDPR, increasingly require technology firms to adopt a robust cyber defense strategy that can detect cyber-threats at an early stage.
Cyber-attacks aimed at technology firms with lucrative IP have also become a fact of life in the Information Age. Often perpetrated by nation-state actors with advanced capabilities, these attacks are now remarkably subtle and stealthy, with some of the latest examples b
Credit Union Times is the nation's leading independent source for breaking news and analysis for credit union leaders. For more than 20 years, Credit Union Times has set the standard for editorial excellence and ethical, straight-forward reporting.