2020 Cyber Security Predictions

January 28, 2020

This year there are some common themes that endure, so we’ll highlight these as “work in progress”. Transformations often take longer than 12 months to be identifi ed as necessary, to be executed and to become established. However, there are other themes emerging through a combination of drivers from audit, compliance security and governance that are now showing signs of infl uencing the way that cyber risks are managed in a much shorter timescale.

Spotlight

Columbitech

Columbitech provides a mobile VPN solution with patented session persistence and advanced data optimizations for M2M, Android, iOS, Windows and Linux, using FIPS 140-2-validated cryptography for compliance with the FBI CJIS requirements and DoD policies. Columbitech Mobile VPN is a software-based solution offering secure, persistent remote access from laptops, tablets, smartphones, and other mobile devices. The FIPS-validated solution also provides regulatory compliance (HIPAA/PCI/SOX) and can be deployed on premise or as a cloud service. With more than two million users, customers include three of the top 10 U.S. retailers, government (local/federal), field force automation, logistics companies, military branches (US/EMEA), and major telecom providers.

OTHER WHITEPAPERS
news image

GE Gas Power Cybersecurity Portal

whitePaper | October 31, 2022

GE Gas Power has developed a product security program based on industry-leading standards, encompassing end-toend cybersecurity through the entire software development lifecycle in conjunction with engineering, sourcing, and vulnerability and incident response. As part of this program, we have also created the Gas Power Cybersecurity Portal, a central, publicly available resource regarding cybersecurity at GE Gas Power.

Read More
news image

Application Security in a Multi-Cloud World

whitePaper | October 18, 2022

In the mad dash to the cloud, organizations have turned their application environments into a miscellaneous mess. Whether it be private, public or on-premise, organizations are leveraging heterogenous application hosting environments as they transition to the next phase of cloud computing: The multi-cloud.

Read More
news image

Pulumi Cloud Security Whitepaper

whitePaper | October 24, 2022

Pulumi is a venture-backed cloud computing company in Seattle, WA, founded by industry veterans with decades of experience creating and operating Enterprise software at companies like Microsoft, Amazon, and Google. Pulumi’s user base includes companies of all shapes and sizes, including ISVs, SIs, and Fortune 500s.

Read More
news image

How MX Protects Your Data

whitePaper | December 22, 2022

MX’s approach to security includes a defense-in-depth strategy. This strategy is supported by an established, operational MX Security Program, with a robust suite of governing policies, processes, security controls, and procedures to achieve MX’s security strategy. MX enacts defense in depth by hardening each layer of MX’s infrastructure and supporting processes.

Read More
news image

The Definitive WFH Security Checklist: 10 Easy Steps to Safer Remote Access

whitePaper | September 15, 2022

Providing secure, fast remote access is a top priority as the modern workforce has become predominantly remote. Working from home (WFH) or outside the office was once a choice or a stopgap measure, but today, it’s critical for business agility.

Read More
news image

Cyber Security for Business

whitePaper | December 17, 2019

At CGI, cyber security is part of everything we do. For more than 40 years, we have helped clients manage complex security challenges with a business focused approach – protecting what is most valuable to them. As our economy becomes even more digital in nature, securing our organisations against cyber-attacks and data breaches has become one of the most important business issues facing senior management.

Read More

Spotlight

Columbitech

Columbitech provides a mobile VPN solution with patented session persistence and advanced data optimizations for M2M, Android, iOS, Windows and Linux, using FIPS 140-2-validated cryptography for compliance with the FBI CJIS requirements and DoD policies. Columbitech Mobile VPN is a software-based solution offering secure, persistent remote access from laptops, tablets, smartphones, and other mobile devices. The FIPS-validated solution also provides regulatory compliance (HIPAA/PCI/SOX) and can be deployed on premise or as a cloud service. With more than two million users, customers include three of the top 10 U.S. retailers, government (local/federal), field force automation, logistics companies, military branches (US/EMEA), and major telecom providers.

Events

Conference

Conference

Conference

Conference

Conference

Conference