Latest Insights
results found
Filter your search:
Resource
Calian ITCS in the News
2022 saw Calian ITCS make headway on a number of successful initiatives and events that received public attention.
Resource
The Truth About Cyber Security Penetration Testing - Calian Podcast
In our last podcast of 2020, our cyber security specialists delve deep into the world of Cyber Security Penetration Testing. Read more about their findings here:
Resource
Calian Cyber Security Breach Report - Issue 15 Data Breaches in Online Education
In today's digital business environment, enhanced and holistic cyber security is essential. However, many companies continue to struggle with resilience, often experiencing breaches that lead to everything from compliance issues, to lost and stolen data and, ultimately, to brand damage and revenue loss. And though it is easy to read about these breaches, the causes and potential solutions are rarely identified.
Resource
Calian Cyber Security eBook - The worst passwords of 2020
How to Avoid Becoming the Next Cyber Crime Victim
Resource
Calian Cyber Security White Paper - Data and its importance to endpoint security
Resource
Calian Cyber Security White Paper—Identity and Access Management Essential In Today’s Data Driven Digital World
Resource
Calian Cyber Security White Paper - How CASB 2.0 Helps Embrace The Cloud & Safeguard Sensitive Data
Resource
Calian Cyber Security eBook - Developing an enterprise-wide encryption strategy for your organization’s sensitive data
Whether your organization stores sensitive data in a physical data centre, a private or public cloud, or in a third-party storage application, proper encryption and key management are critical to ensure that data is well protected. This can be achieved by developing and implementing an enterprise-wide encryption strategy to protect your most valuable data.
Resource
Calian Cyber Security Podcast - The Encryption Conundrum
For so many organizations, data encryption is a puzzle that seemingly cannot be solved. Whether it’s choosing the right types of encryption to best suit business needs or implementing a solution that doesn't hinder productivity or speed—in the end, most are left wanting. In this podcast, our cyber security experts discuss and debate the need for encryption, the different kinds of encryption out there, and how to choose the best solution.
Resource
Calian Cyber Security Podcast - The Data Defence
Data and analytics are used in all facets of corporate management, driving decisions, direction and results. In this podcast, our security executives discuss the importance of data as a powerful defence against cyber crime, one that enables organizations to effectively monitor risks, identify anomalies, thwart attacks, all while creating predictive modeling that continues to advance over time.
Resource
Calian Cyber Security eBook - Behavioral Analytics
How to Protect IP, Detect Compromised Accounts, and Reduce Insider Risk
Resource
Calian Cyber Security eBook - Five of the Scariest Things About the Internet of Things
Many IoT devices still pose major security issues that can cost us everything
- 1