Humans are the weak point in cyber - how do we change that?

Tom Allen
clock
In this corner: firewalls, encryption and anti-virus software. In THIS corner: Dave.
Image:

In this corner: firewalls, encryption and anti-virus software. In THIS corner: Dave.

The changing business environment has created more opportunities for workers to cause a breach - not always unknowingly

Forcepoint's CIO, Meerah Rajavel, and chief scientist, Dr Richard Ford, spoke at Gartner's Security & Risk Management Summit this week, discussing methods for countering the human threats in cyber ...

To continue reading this article...

Join Computing

  • Unlimited access to real-time news, analysis and opinion from the technology industry
  • Receive important and breaking news in our daily newsletter
  • Be the first to hear about our events and awards programmes
  • Join live member only interviews with IT leaders at the ‘IT Lounge’; your chance to ask your burning tech questions and have them answered
  • Access to the Computing Delta hub providing market intelligence and research
  • Receive our members-only newsletter with exclusive opinion pieces from senior IT Leaders

Join now

 

Already a Computing member?

Login

More on Hacking

British Army's Twitter and YouTube accounts hijacked to promote crypto scams

British Army's Twitter and YouTube accounts hijacked to promote crypto scams

However, everything was back to normal on both accounts by Sunday night

clock 04 July 2022 • 3 min read
AMD investigates alleged 450 GB data theft by RansomHouse group

AMD investigates alleged 450 GB data theft by RansomHouse group

The group claims AMD had a weak password policy

clock 30 June 2022 • 3 min read
The company specialises in delivering easy-to-prep meals to care homes, nurseries and elderly people

Cyberattack stops all deliveries at Wiltshire Farm Foods

The attack was so severe the firm couldn't even inform customers of the loss of service.

clock 29 June 2022 • 2 min read