Remove Case Study Remove Education Remove Encryption Remove Industry
article thumbnail

Worrying Ransomware Trends, and What to Do About Them

IT Governance

In this interview Ransomware trends Why these trends are worrying How to decide whether to pay the ransom Why ransomware groups favour exfiltration over encryption What to do if you suffer an exfiltration attack The importance of root-cause analysis Mitigating the damage done Preventing future attacks To what extent do you track industry news?

article thumbnail

15 Top Cybersecurity Certifications for 2022

eSecurity Planet

“Certifications range from penetration testers , government/industry regulatory compliance , ethical hacking , to industry knowledge,” he said. Those who pursue an in-depth technical education in all areas of information security are the target audience for the GSE certification.”

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Protecting Against the Risks and Managing the Complexities of a Quantum World with Thales and IBM Consulting

Thales Cloud Protection & Licensing

Thales and IBM Consulting are working together to lead and guide the industry in how to successfully address these threats and challenges. As quantum computing continues to advance, the threat it poses to traditional encryption methods is clear. Read the customer case study from a large leading financial institution.

Risk 87
article thumbnail

Elearning Staff Awareness Course Overview: Ransomware

IT Governance

In his more than 30 years in the industry, he’s helped both private- and public-sector organisations reduce the risks to their on-site and Cloud-based IT environments. The course also features numerous examples and case studies. One of my personal favourite features is the new Colonial Pipeline case study.

article thumbnail

What Is a SaaS Security Checklist? Tips & Free Template

eSecurity Planet

This framework guarantees that appropriate authentication measures, encryption techniques, data retention policies, and backup procedures are in place. Is data encrypted in transit and at rest? Is your firm in compliance with the Payment Card Industry Data Security Standard (PCI DSS) to protect cardholder data during transactions?

Security 108