Sat.Oct 26, 2019 - Fri.Nov 01, 2019

article thumbnail

The view from a super recogniser 

Crisis Response Journal

If you follow the news, it’s impossible to miss the heated debate that is currently surrounding the trial and potential roll-out of automated facial recognition technology by police forces, says Kenny Long.

article thumbnail

What Goes Into a Cyber Data Risk Assessment?

Plan B Consulting

Charlie proposes an inventory of information which your organisation should consider to conduct a cyber data risk assessment. This week, I was conducting an exercise for a government organisation. As we have worked with the company for a number of years we decided to go for a slightly different set-up, so this time we used loss-of-data as the scenario.

Banking 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Devotee

arunpraka shray

My Asia Pacific CEO wanted me to step down from my current role in a leading Finance Multi-national. I have seen better days, huge profits for the Company’s India arm, distributed fat bonuses to thousands of employees, still he wanted me out. I didn’t sleep almost for a week now, had dark circles under my eyes, and ate frugally owing to a lost appetite.

Travel 52
article thumbnail

How Trick or Treaters Can Hack Your Business!

NexusTek

READ TIME: 3 MIN October 29, 2019 How Trick or Treaters Can Hack Your Business! Businesses are becoming more mobile-focused to make it easier for employees to be more productive. Its nearly standard practice to issue company phones, tablets, and laptops but when employees use their devices at home and connect to unsecured networks , it creates another layer of risk to organizations.

article thumbnail

Are Robots Replacing You? Keeping Humans in the Loop in Automated Environments

Speaker: Erroll Amacker

As businesses increasingly adopt automation, finance leaders must navigate the delicate balance between technology and human expertise. This webinar explores the critical role of human oversight in accounts payable (AP) automation and how a people-centric approach can drive better financial performance. Join us for an insightful discussion on how integrating human expertise into automated workflows enhances decision-making, reduces fraud risks, strengthens vendor relationships, and accelerates R

article thumbnail

How much risk small businesses really pose to supply chain cybersecurity?

Behavior Group

50% of large enterprises view third-party partners of any size as a cybersecurity risk, but only 14% have experienced a breach as the result of a small business partner, while 17% have been breached as the result of working with a larger partner, according to ISC2. risk, supply chain, cybersecurity The study surveyed more than… Continue reading.

article thumbnail

Cyber Security Tip: Detecting Attacks Over Low-Traffic Ports

NexusTek

READ TIME: 4 MIN October 29, 2019 Cyber Security Tip: Detecting Attacks Over Low-Traffic Ports Last year, cyber security experts witnessed an increase in the number of encrypted web application, highly targeted phishing and ransomware attacks. IoT (Internet of Things) attacks also increased by 217.5 percent when compared with 2017 numbers. In the wake of vulnerabilities like Spectre, Meltdown, Foreshadow, and PortSmash, threat researchers have identified processor vulnerabilities as a major secu