30 June 2016 / Architecture and Design / Neil Cordell
Cloud Computing Today Since Corix Partners started to look at cyber security in the Cloud, its adoption has continued to grow. This is not only attributable to the continued pressure on cost but more importantly due to the realisation that the Cloud c… Read more »
23 June 2016 / Strategy and Governance / JC Gaillard
True independence is a rare commodity in the Cyber Security world There is an incredible amount of material online and on social media around cyber security. But the vast majority of it is either sponsored by technology vendors or directly associated w… Read more »
16 June 2016 / JC's Column / JC Gaillard
In several articles last year, we have explored how to organise InfoSec for success and how to best establish the reporting line of the CISO. Our view – built on years of direct field experience – is that the reporting line of the CISO has to be at boa… Read more »
9 June 2016 / Strategy and Governance / JC Gaillard
Cyber security must be at the heart of the public sector IT agenda and must be seen as a necessary barrier against real and active threats. It needs to be actively implemented at people, process and technology levels. It needs to be embedded in the min… Read more »
2 June 2016 / Cyber Security Community / Corix Partners
Corix Partners is active at a number of levels in the wider cyber security community in the UK and abroad. This is a summary of the activities which we have undertaken during April and May 2016. Corix Partners attended the Personal Data & Trust Net… Read more »
26 May 2016 / Leadership Development, Strategy and Governance / JC Gaillard
Cloud computing has been a hot topic for the best part of the last five years. And security considerations have been at the heart of many cloud discussions throughout. However, the context against which many Cloud decisions are made is changing. Evolut… Read more »
19 May 2016 / Strategy and Governance / JC Gaillard
Cyber Security Transformation is not about implementing yet another technology product Anybody who has spent a few years in InfoSec management has seen this happen: Following an internal near-miss or some high-profile security incident widely publicise… Read more »
12 May 2016 / Leadership Development, Strategy and Governance / JC Gaillard
Cyber threats are a reality for most organisations. However, misconceptions and misunderstandings about the true nature of InfoSec are still hindering the protection of highly strategic information assets. Here, we offer to outline key pitfalls that CI… Read more »
5 May 2016 / Strategy and Governance / Neil Cordell
Over the last few years, there has been and continues to be a significant focus on Digital Transformation. It is driven by a varied reasons from innovation focused management through to poor results and stakeholder concerns. There is clearly significa… Read more »
28 April 2016 / Leadership Development / JC Gaillard
Cyber threats are a growing concern for most organisations. However, it appears that reactive, expensive and inefficient practices are still underpinning most InfoSec strategies. As we have argued in previous articles, it is an issue that must be addre… Read more »
