Using Risk Scenarios for COBIT 5 to Help Achieve Business Success

Using Risk Scenarios for COBIT 5 to Help Achieve Business Success

If I had a £1 for every time a client said “it won’t happen to us,” I would be a very rich man and probably would not be writing this blog! Risk management is about minimizing the chance that it will happen to us, by anticipating what might occur to affect the successful delivery of [...]

Verizon DBIR Says You Can’t Stop the Storm—But You Can See It Coming

Verizon DBIR Says You Can’t Stop the Storm—But You Can See It Coming

The 2016 Verizon Data Breach Investigations Report (DBIR) paints a grim picture of the unavoidable enterprise data breach. But accepting the inevitability of breaches doesn’t mean accepting defeat. It’s like severe weather: you can’t prevent a tornado or hurricane. But with the right visibility tools, you can recognize patterns and mitigate your risk. Likewise with [...]

Watch: Prevention Against Targeted Phishing Attacks

Watch: Prevention Against Targeted Phishing Attacks

In this Lightboard session, Martin Walter explains how the integration of Palo Alto Networks global URL Filtering service (PAN-DB) works with the single-pass architecture of our next- generation firewalls and our Threat Intelligence Cloud to allow you to safely enable web access while protecting against malware or phishing sites. Learn more Visit the resource page [...]