Connected Risks: Cybersecurity regulations and mitigation approaches in U.S., Europe & Asia

April 12, 2018

Protecting data is tricky business. Cyberattacks have become a global epidemic and are becoming increasingly more powerful and harder to stop. Organizations, critical infrastructure, and governments are being targeted with timely, sophisticated attacks. In this article, FTI Consulting shares perspectives on evolving cybersecurity regulations and how governments and businesses are preparing for the next data

Are Dockless Bikes a Cybersecurity Threat?

February 15, 2018

FTI Consulting’s Anthony J. Ferrante discusses the potential security risks associated with dockless bike services based on the financial and mobility data that such services collect in this CityLab article Are Dockless Bikes a Cybersecurity Threat?

Compass Points: The Perils of Data-Sharing

January 31, 2018

In the wake of security concerns over the Strava app, FTI Consulting’s Head of Cybersecurity, Anthony J. Ferrante comments on the risks associated with other data-sharing technologies, including dockless bike services in this CityLab article.

A Look Into the Crystal Ball: Cybersecurity Predictions for 2018

December 27, 2017

In this article, FTI’s Head of Cybersecurity comments on cyberspace becoming the new battlefield for modern warfare, the rise in malicious state-sponsored activity, the exploitation of information as a weapon for financial, political and other gain, and urges cybersecurity professionals to be prepared to stay ahead of malicious actors.

Come Fly the Hackable Skies

October 12, 2017

FTI’s Anthony J. Ferrante is featured in this article Come Fly the Hackable Skies on SecurityInfoWatch.com and outlines a number of proactive measures that the aviation industry and organizations at large can adopt to address emerging cybersecurity threats.

Data Breach Prevention and Information Governance Go Hand-In-Hand

October 30, 2016

Information governance (IG) has a wide range of varying definitions, depending on whom you ask. Some consider it to be an amorphous collection of policies that are difficult to translate into the real world. Others view it as a holistic strategy document, or a series of discrete, tactical projects that implement best practices in data security or storage optimization.