Risk Management October 3, 2017 Basic Security Tools You Cannot Afford to Miss in Your Risk Management Program 5 min read - Security professionals can leverage freely available, open source security tools to protect their environments from threats.
CISO September 25, 2017 From the Starship Enterprise to Your Enterprise: Eight Cybersecurity Lessons From ‘Star Trek’ 5 min read - To prepare for the upcoming "Star Trek: Discovery" series, here are eight cybersecurity lessons companies can learn from the science fiction franchise.
CISO September 21, 2017 When Responding to a Data Breach, Cooperation Is Nine-Tenths of the Law 3 min read - When responding to a data breach, the CISO must work closely with the legal department to minimize the risks of litigation and reputational damage.
Fraud Protection September 18, 2017 Raise the Red Flag: Guidelines for Consuming and Verifying Indicators of Compromise 7 min read - Before sharing indicators of compromise, analysts must consider the sensitivity of the data and verify the identities of the senders and receivers.
Application Security September 13, 2017 Don’t Constrict Your Cyber Potential in 2017 — Upskill With Python Programming Language 3 min read - The highly versatile Python programming language enables developers to write software for penetration testing, web development, applications and more.
CISO September 11, 2017 The CISO’s Guide to Managing Insider Threats 4 min read - To effectively manage and remediate insider threats, the CISO must establish a comprehensive approach to governance, data analysis and incident response.
Intelligence & Analytics September 7, 2017 Is Your Company Secure by Design? Aligning Security With Business Objectives 2 min read - The key to aligning security with business objectives is to make assets secure by design, which gives analysts sufficient visibility to respond to threats.
Risk Management September 6, 2017 Know Your Data and Your Enemies: Establishing a Baseline for Proactive Threat Hunting 3 min read - Threat hunting enables security teams to improve incident response speed and accuracy. It also empowers them to remediate threats proactively.
Incident Response September 6, 2017 Operational Integrity and Incident Response for IoT Security 2 min read - An incident response plan, basic understanding of the threat landscape and regular security testing are crucial to IoT security.
Intelligence & Analytics September 5, 2017 Seven Steps to Improve Your Security Operations and Response 3 min read - Organizations can improve their security operations and response capabilities by adopting a multilayered approach driven by cognitive technology.