By presenting the right security metrics to executives, CISOs can develop a strong business case for greater investment in cybersecurity.
Protecting endpoint-generated data is the name of the game in cybersecurity today. However, increasing shares of shadow IT devices in the workplace are making app security a more significant challenge.
Sridhar Muppidi, CTO of cloud security and IAM at IBM Security, and Shamla Naidoo, global CISO at IBM, took time to discuss topics ranging from AI and blockchain to threat sharing and collaboration.
When a CISO is also an articulate leader, he or she can teach the company at large why cybersecurity is essential to business interests and motivate stronger coordination to achieve goals.
The 2018 NIST guidebook offers holistic, deeply integrated strategies for enterprise security, including establishing broad cultural standards for risk management.
As the threat landscape expands — and IT skills grow increasingly scarce — many security leaders don't know how to get the most out of their security information and event management (SIEM) solution.
The 2018 Cost of a Data Breach Study from Ponemon Institute reveals that the total cost, per-capita cost and average size of a data breach have all increased year over year.
The latest report from the DCRO urged top leadership to become more engaged in cyber risk governance and to hold all departments — not just IT — accountable for proper security hygiene.
As more millennials enter the workforce, organizations should consider different approaches to security awareness training to account for generational knowledge gaps.
As companies grow, the process of hiring IT professionals becomes increasingly tedious, putting them at risk of missing out on top talent.