Software Vulnerabilities September 12, 2019 The Art of Patch Management 4 min read - The vagaries of systems and organizations, compounded by the irrationality of the human mind and variations in patches themselves, means that patch management is not an exact science — it's an art.
Application Security August 28, 2019 Considering Container Security? 6 Ways to Make a Case for Containerization 5 min read - Containerization can create a pathway to secure digital transformation. Discover how to make a business case for container security.
Incident Response August 26, 2019 What Is SIEM and How Does It Enhance Threat Detection? 3 min read - What is SIEM? Security information and event management helps organizations detect threats via fine-grained, real-time visibility into on-premises and cloud-based activity.
Risk Management August 14, 2019 Is staff burnout the best reason to implement cybersecurity AI? 4 min read - Staff burnout in the cybersecurity industry is at worrisome levels. With more data production and next-generation technology around the corner, now may be the best time to implement cybersecurity AI.
CISO August 5, 2019 4 Questions CISOs Need to Ask About Enterprise Cybersecurity 4 min read - It's not always easy to ask the hard questions about enterprise cybersecurity. Here are four questions that CISOs need to answer to boost infosec impact.
CISO July 25, 2019 This Is What Experts Say Will Turn the Tide Against Increasing Cyberthreats 3 min read - Most organizations could blunt the vast majority of cyberthreats by making better use of the tools they already have and protecting their most precious data.
Data Protection July 3, 2019 Finding New Approaches to Web Application Security 3 min read - Because so much is centered on web services and similar technology nowadays, web application security must be a high priority within any security system.
Endpoint July 1, 2019 Technology, the Enterprise or the User: Which Owns Mobile Security? 4 min read - To best manage mobile security within your enterprise, you need to maintain balance between technology, enterprise and user responsibilities.
Intelligence & Analytics June 20, 2019 Pulling Strategic Value Out of Your Cyberthreat Intelligence Practices 5 min read - Having access to or generating cyber threat intelligence doesn't automatically translate into better security outcomes. So how can organizations squeeze the most out of their intelligence practices?
Artificial Intelligence June 7, 2019 Have Your Virtual Assistant Call My Bot and We’ll Do Lunch: A Step Toward the Cognitive Enterprise 4 min read - In the near future, we're going to see the role of office power broker shift from an administrative assistant to a virtual assistant. How does the CISO's role change in this cognitive enterprise?