![CGI’s Cybersecurity Practice](https://www.cgi.com/sites/default/files/styles/expert_profile_thumbnail/public/blog-practice-profile-consultants-looking-at-papers.jpg.webp?itok=nljrtM28)
When IoT means Internet of Threats
This new world of the Internet of Things (IoT) is transforming organizations as well as personal homes and even individual consumers into “data centers” where information technology is used for...
This new world of the Internet of Things (IoT) is transforming organizations as well as personal homes and even individual consumers into “data centers” where information technology is used for...
This blog post discusses a new study into boardroom attitudes of cybersecurity conducted by CGI in the UK in conjunction with the Centre for Economics and Business Research (Cebr).
This blog post discusses how unfettered access to cloud applications for local government innovation initiatives could also give rise to shadow IT that increases complexity, costs and security risks.
This CGI blog post discusses the different types of security risks involved with hybrid IT delivery models
This blog post presents 10 questions every elected official should be asking about cybersecurity in their jurisdiction.
Strong authentication of mobile users is an increasingly important issue for enterprises and commercial entities. While it is likely impossible to have perfect authentication security, taking care while engineering an...
This post describes the critical steps to include in an active insider threat risk management program.