Humans are the weak point in cyber - how do we change that?

Tom Allen
clock
In this corner: firewalls, encryption and anti-virus software. In THIS corner: Dave.
Image:

In this corner: firewalls, encryption and anti-virus software. In THIS corner: Dave.

The changing business environment has created more opportunities for workers to cause a breach - not always unknowingly

Forcepoint's CIO, Meerah Rajavel, and chief scientist, Dr Richard Ford, spoke at Gartner's Security & Risk Management Summit this week, discussing methods for countering the human threats in cyber security....

To continue reading this article...

Join Computing

  • Unlimited access to real-time news, analysis and opinion from the technology industry
  • Receive important and breaking news in our daily newsletter
  • Be the first to hear about our events and awards programmes
  • Join live member only interviews with IT leaders at the ‘IT Lounge’; your chance to ask your burning tech questions and have them answered
  • Access to the Computing Delta hub providing market intelligence and research
  • Receive our members-only newsletter with exclusive opinion pieces from senior IT Leaders

Join now

 

Already a Computing member?

Login

More on Strategy

Evolving rapidly doesn't have to mean rip and replace

Digital transformation vs. continuity: how to win IT's biggest battle

Transformation is often at odds with continuity – but it doesn't have to be

Computing Staff
clock 11 January 2022 • 4 min read
You can have your cake and eat it, too

The powerful impact of purposeful acceleration

It is possible to modernise your estate while staying afloat, but it requires a coherent strategy

Computing Staff
clock 06 January 2022 • 4 min read
Jane Deal, IT director, the Law Society

Understanding the post-pandemic operating model: An interview with Jane Deal, IT director, the Law Society

Deal discusses the technologies exciting her at the moment, and which trends she finds most concerning

Stuart Sumner
clock 20 December 2021 • 3 min read