Cloud Security February 1, 2018 10 Steps to Evaluate Cloud Service Providers for FedRAMP Compliance 4 min read - Companies that wish to do business with federal government agencies in the cloud must complete these 10 steps to achieve FedRAMP compliance.
Risk Management January 26, 2018 Choosing the Right Security Framework to Fit Your Business 3 min read - By adopting a hybrid security framework, organizations can cherry-pick the guidelines and compliance requirements that meet their unique business objectives.
Identity & Access January 16, 2018 Meeting Identity and Access Management Challenges in the Era of Mobile and Cloud 4 min read - In our increasingly connected world, identity and access management is more crucial than ever for organizations seeking to empower their workforce with mobile and cloud technologies.
CISO December 15, 2017 Things to Consider When Calculating the Return on Security Investment 3 min read - The return on security investment is a crucial calculation to help CISOs demonstrate risks in business terms and gain executive buy-in for security tools.
CISO November 21, 2017 Quit Your Day Job: Filling the Cybersecurity Skills Gap With Freelance Security Professionals 3 min read - Hiring freelancers can help companies close the cybersecurity skills gap, reduce overhead and infuse a fresh perspective into the organizational culture.
CISO October 30, 2017 Security Awareness Training Is a Team Effort 2 min read - To promote security awareness throughout the organization, CISOs should invite employees in disparate departments to help design training materials.
CISO October 20, 2017 Don’t Let Organizational Politics Derail Security Initiatives 2 min read - For IT professionals, gaining executive buy-in for information security initiatives requires masterful navigation of organizational politics.
Healthcare October 6, 2017 The CISO’s Guide to Minimizing Health Care Security Risks 3 min read - CISOs must possess skills and expertise in multiple areas to combat health care security risks in this age of ransomware and connected medical devices.
CISO September 21, 2017 When Responding to a Data Breach, Cooperation Is Nine-Tenths of the Law 3 min read - When responding to a data breach, the CISO must work closely with the legal department to minimize the risks of litigation and reputational damage.
CISO September 11, 2017 The CISO’s Guide to Managing Insider Threats 4 min read - To effectively manage and remediate insider threats, the CISO must establish a comprehensive approach to governance, data analysis and incident response.
Artificial Intelligence August 31, 2017 Why Machine Learning Is an Essential Tool In the CISO’s Arsenal 4 min read - To protect their networks from malicious insiders, user negligence and other threats, CISOs need advanced machine learning capabilities such as UBA.
CISO August 4, 2017 Hire a Team of Hackers to Identify Vulnerabilities 3 min read - Many companies have adopted the practice of recruiting a team of hackers to poke holes in their networks and assess their incident response capabilities.