CGI’s Cybersecurity Practice
CGI’s Cybersecurity Practice

The impact of a cyber breach on public sector organizations

2017-06-22

Recently, CGI commissioned research from Oxford Economics— The Cyber-Value Connection—to explore the link between a cyber incident and company value. Specifically, we wanted to develop an analytical methodology to examine...

CGI’s Cybersecurity Practice
CGI’s Cybersecurity Practice

OT-IT convergence brings opportunities and risk

2017-06-01

Operational technology (OT) or industrial control systems (ICS) are responsible for keeping the power on and water and gas flowing to support essential services for consumers, industry and governments. As...

CGI’s Cybersecurity Practice
CGI’s Cybersecurity Practice

When IoT means Internet of Threats

2017-03-15

This new world of the Internet of Things (IoT) is transforming organizations as well as personal homes and even individual consumers into “data centers” where information technology is used for...

CGI’s Cybersecurity Practice
CGI’s Cybersecurity Practice

Best practices for building strong mobile biometric authentication

2015-09-09

Strong authentication of mobile users is an increasingly important issue for enterprises and commercial entities. While it is likely impossible to have perfect authentication security, taking care while engineering an...