17 Posts

Jasmine Henry

Jasmine Henry (formerly Jasmine W. Gordon) is a Seattle-based emerging commentator and freelance journalist specializing in analytics, information security, and other emerging tech trends. Her work has appeared in Forbes, Time, Reuters, HR Professionals Magazine, ADP Spark, HP Tektonika, Mimecast, and dozens of other publications.With a background in IT project management and data analysis, Henry has direct experience with the application of emergent technology trends in both startup and enterprise settings. She specializes in translating complex trends and massive data sets into high-value, shareable news and blog posts. Henry holds a MS in Informatics & Analytics from Lipscomb University in Nashville, where she also completed a graduate certificate in Health Care Informatics.

Written By Jasmine Henry

The Biggest Stories From RSAC 2019: What Scares the Cybersecurity Experts?

When the perspectives of CISOs and experts at RSAC 2019 are viewed as a continuum, you can begin to see a story emerging about the state of cybersecurity in 2019.

Women in Security Speak Out at RSAC 2019, But There’s Still a Long Way to Go

At RSAC 2019, IBM Security General Manager Mary O'Brien noted that while the industry has made progress toward improving the experience of women in security, "a little better isn't going to cut it."

At RSAC 2019, It’s Clear the World Needs More Public Interest Technologists

In a world where technology and culture are one and the same, public-interest technologists are critical to a better future.

RSA Conference 2019 Guide: Insider Tips From an RSAC 2018 Survivor

Discover tips on how to survive RSA Conference 2019, based on first-hand knowledge from an RSAC 2018 survivor and can't-miss sessions from this year's show.

Endpoint Management Missteps in the ‘Die Hard’ Franchise: Viewing a Holiday Favorite Through a Cybersecurity Lens

Security professionals can learn valuable lessons about endpoint management from the "Die Hard" franchise of holiday-themed thrillers.

5 Ways CISOs Can Improve Collaboration on Security Risks

While the CISO's role is more important than ever, recent studies have revealed a disconnect between CISOs and business executives and difficulities communicating security risks in business terms.

These 5 Types of Insider Threats Could Lead to Costly Data Breaches

Insider threats are not only the most common cause of cybersecurity risk, but also the costliest and hardest to detect.

Stories From the Edge of IoT Security: Threat Demos From Black Hat and DEF CON

At Black Hat 2018 and DEF CON 26, experts shared insights about IoT security risks and vulnerabilities and offered advice to help organizations and consumers navigate our increasingly connected world.

7 Ways to Identify Darknet Cybersecurity Risks

Explore seven characteristics of security risk from the dark and hidden web. Learn how organizations can capture the latent value of dark-sourced threat intelligence.

5 Ways Privacy by Design Can Rebuild Consumer Trust

As enterprises adopt GDPR requirements of privacy by design and default, there's an opportunity to win customer trust and build meaningful relationships through customer education around data privacy.