07.2022 . Spotlight
Cloud Economics and Damaging Mistakes to Avoid
Cloud computing brings tremendous opportunities – but only to those who understand its economics. The traditional model of computing is “owning” rather than “consuming”.
07.2022 . Spotlight
State of Cloud Security: Concerns, Challenges, and Incidents
Digital transformation to the cloud is on the way, and the COVID-19 pandemic accelerated that trend. But cloud adoption is not without risk.
07.2022 . Spotlight
The 5 Biggest Cloud Computing Trends in 2022
Since the 2003 Amazon leadership retreat, an entire cloud industry has developed, changing the way businesses operate and compete.
06.2022 . Spotlight
Conti's Attack Against Costa Rica Sparks a New Ransomware Era
A series of targeted ransomware cyber attacks paralysed parts of Costa Rica – and rewrote the rules of cybercrime. The hacking spree is the first known instance of a hacker group targeting specifically a government. What can countries do to build resilience against these attacks?
06.2022 . Spotlight
Stopping the Domino Effect: Cyber Resilience in the Supply Chain
Supply chains are the connecting tissue between companies, industries, and even countries. Disruption in these supply chains can lead to bullwhip effects, travelling up or downstream, leading to shortages and bottlenecks. How can companies improve the cyber resilience in their supply chains?
06.2022 . Spotlight
The Quest For Resilience
Some companies that used to be shining stars no longer exist. Think about Kodak, Blackberry, or Nokia. Other companies have weathered the test of time and survived and thrived through the most turbulent times; think about Lloyd’s, which has grown for over 330 years to become the world’s largest insurance market. But how can companies achieve strategic resilience and longevity?
05.2022 . Spotlight
Sophos 2022 Threat Report: Interrelated Threats Target an Interdependent World
The cyber threat landscape is constantly changing and evolving. What are the five trends security company Sophos identifies that will shape the cybersecurity landscape?