In: Management, Technology

IT Security

How do you protect yourself and your company from cyberattacks? Every day, criminals find new ways to break the most sophisticated security systems and exploit their vulnerabilities. Without the right precautions someone may steal your data, interfere with your software, damage your hardware, misdirect your services and jeopardize the integrity of your corporate IT systems. The best protection is for you and your team to stay informed and alert so that you can react swiftly to necessary updates and other security measures.

Related Channels

Summaries

9 Book

Effective Vulnerability Management

Managing Risk in the Vulnerable Digital Ecosystem
Chris Hughes and Nikki Robinson
Wiley, 2024
8 Article
Marc Schuuring et al.
Boston Consulting Group, 2022
8 Book

Cyberinsurance Policy

Rethinking Risk in an Age of Ransomware, Computer Fraud, Data Breaches, and Cyberattacks (Information Policy)
Josephine Wolff
MIT Press, 2022
9 Article
Miri Marciano et al.
Boston Consulting Group, 2022
8 Book

Crime Dot Com

From Viruses to Vote Rigging, How Hacking Went Global
Geoff White
Reaktion, 2021
8 Book

The Cybersecurity Playbook

How Every Leader and Employee Can Contribute to a Culture of Security
Allison Cerra
Wiley, 2019
9 Book

Cyber Privacy

Who Has Your Data and Why You Should Care
April Falcon Doss
BenBella, 2020
Book

Cyberjutsu

Cybersecurity for the Modern Ninja
Ben McCarty
No Starch Press, 2021
8 Video

Unilever’s Bobby Ford Discusses How to Secure Your Digital Business

Due to COVID-19, companies struggled to balance security and privacy while digitizing business. Unilever’s Bobby Ford discusses the steps his company took to secure its digital assets.
Bobby Ford
WSJ Video, 2020
8 Video

What Is the Real Cost of a Breach?

WSJ’s David Breg and Rob Sloan discuss how understanding the costs of a breach can help companies organize defenses and prioritize investments.
David Breg
WSJ Video, 2020
9 Video

The New Attack Surface is Your Life

The Latest in Cyber Attacks
Martin Casado
A16Z, 2020
8 Article

Cybersecurity Needs Women

Safeguarding our lives online requires skills and experiences that lie beyond masculine stereotypes of the hacker and soldier, says Winifred R. Poster.
Winifred R. Poster
Nature, 2018