Corix Partners black banner

21 April 2016 / Strategy and Governance / JC Gaillard

How does information security end up in the portfolio of the CIO? Historically, the CIO has ended up in charge of information security in many organisations because many tactical measures required to deal with cyber threats lie in the IT field. For dec… Read more »

Read More

14 April 2016 / Strategy and Governance / JC Gaillard

Compliance and audit-oriented “tick-in-the-box” practices are still underpinning many InfoSec strategies. Huge sums of money are being spent on supposedly “one-size fits all” reactive solutions to one-off threats. However, such a firefighter mentality… Read more »

Read More

7 April 2016 / Guest Blog / Kevin Palop

The Era of Digital Use Cases During the Eighties, technology moved forward considerably. However, as is the case at each technological break point, far reaching evolutions remained un-exploitable for a long time: They were elitist, expensive and didn’t… Read more »

Read More

30 March 2016 / Strategy and Governance / Corix Partners

Cyber threats have a global reach and target all industry sectors. But the Wealth Management industry makes a particularly attractive target because it handles large amounts of capital associated with high profile wealthy clients, and is also home of a… Read more »

Read More

24 March 2016 / Guest Blog / Rick Warley

The proposed guidance from the FCA for firms outsourcing to the Cloud is a ray of sunshine in a regulatory environment that is usually cast with the gloom of extra work and additional costs. Nowadays, with financial institutions relying heavily on tech… Read more »

Read More

17 March 2016 / Cyber Security Community / Corix Partners

Corix Partners is active at a number of levels in the wider cyber security community in the UK and abroad.  This is a summary of the activities which we have undertaken during February and March 2016.     Corix Partners were delighted to atte… Read more »

Read More

10 March 2016 / Architecture and Design, JC's Column, Strategy and Governance / JC Gaillard

For years, many technology firms have treated security and privacy matters as an afterthought. It was at best a necessary evil related to regulations and compliance; at worst, something you would window-dress on the day in front of those few clients wh… Read more »

Read More

3 March 2016 / Leadership Development, Strategy and Governance / JC Gaillard

In line with the 2015 World Economic Forum (WEF), which took place in Davos, Switzerland in January, the Partnership for Cyber Resilience published its latest report “Towards the Quantification of Cyber Threats” – in collaboration with Deloitte. The re… Read more »

Read More

18 February 2016 / Guest Blog / Charles D'Aumale

Why French? France has worldwide leaders in civil engineering, luxury goods, aerospace, and nuclear industry for civil and military applications. But when it comes to cyber security editors and public safety technologies, there is usually a tendency to… Read more »

Read More

4 February 2016 / Neil's Column / Neil Cordell

What is Legacy IT? There are many consequences of running legacy technologies and they are often the result from management decisions based on false economies.  However, in this article, I am only going to focus on the impact to cyber security and how… Read more »

Read More


Previous Page 25 of 31 Next