CISO July 27, 2015 Mobile Security: Look Beyond the Device 2 min read - An enterprise-wide mobile security framework needs to protect devices and data, all while ensuring compliance and managing access, as well.
CISO July 9, 2015 Cyber Risks: From the Trenches to the Boardroom 4 min read - Business leaders must learn to recognize, manage and mitigate cyber risks. This task requires cooperation and awareness across C-suites and boardrooms.
CISO July 8, 2015 Looking Ahead: CISO Strategies for 2020 3 min read - Certain CISO strategies will ensure an enterprise is poised to meet the challenges associated with new tech advancements, from mobile to cloud.
June 26, 2015 Lacking Leadership? Corporate Cyberdefenders Struggle to Hold the Line 3 min read - Lacking leadership, corporate cyberdefenders struggle to hold the line against malicious actors. Have companies already lost the war?
Risk Management June 19, 2015 Key Components of a High-Performing Information Risk Management Program 10 min read - Establishing a high-performing information risk management program requires efforts focused on risk identification, data protection and user behavior.
CISO June 3, 2015 As an Information Security Professional, Are You Having the Right Conversations? 3 min read - As an information security professional, you're increasingly being asked to report to business executives. Are you having the right conversations?
May 29, 2015 Eighty Percent of Employees Confess to Taking Major Cybersecurity Risks 2 min read - A recent research study showed that employees continue to take major cybersecurity risks despite being aware of the danger they pose to their companies.
CISO May 28, 2015 As Data Breach Costs Soar, Boards of Directors Must Get Involved 3 min read - The "2015 Cost of Data Breach Study: Global Analysis" showed that the financial and operational consequences of a data breach are quite significant.
CISO May 14, 2015 Take Notes: How the Academic World Can Inform Security 4 min read - Experts from the academic world provided information that could contribute to business solutions as part of a study by the IBM Center for Applied Insights.
May 11, 2015 New SAP Vulnerabilities Create Sticky Situation for IT Security 2 min read - New SAP vulnerabilities could pose a serious problem for IT security professionals; despite its ubiquity, SAP is often overlooked as a security risk.