CISO January 25, 2016 Business Continuity Management: Crisis Leadership 8 min read - Effective business continuity management depends on a strong leader who must implement recovery processes, guide employees and proactively build plans.
Risk Management January 21, 2016 The One Thing Criminal Hackers Have on Their Side That You Don’t 2 min read - Criminal hackers have nothing but time to carry out cyberattacks, whereas security professionals must respond quickly with limited resources.
Risk Management January 7, 2016 Figuring Out What Happened After a Data Breach 2 min read - So you know a data breach has occurred — now what? Here's what security leaders need to ask when responding to a network event.
Incident Response November 23, 2015 The Importance of Having an Effective Incident Response Team 2 min read - Having an incident response team can drastically improve the reaction to a security event, but businesses have to invest in the right areas.
Security Services October 14, 2015 Connecting the Dots: Experiences in Real-Life IT Security Incident Handling 2 min read - A recently published report describes attack scenarios, the circumstances leading to an incident and the countermeasures that could have prevented it.
Malware September 30, 2015 Ransomware Goes Back to the Future 3 min read - Ransomware remains a common attack, and it will continue to be a popular choice for cybercriminals until enterprises improve end user education.
Intelligence & Analytics September 10, 2015 Michelin Stars and Cybersecurity Intelligence 4 min read - Being a chef and a security professional are more alike than one might think, and the similarities start with using intelligence to improve efficiency.
Incident Response June 9, 2015 Addressing Your Security Program One Small Step at a Time 2 min read - Organizations can form an effective security program by following a few basic best practices and dedicating themselves to a long-term effort.
CISO May 29, 2015 Business Continuity: The Unsung Hero of Security Intelligence 3 min read - In planning for and responding to a data breach, IT experts should work with business continuity teams as part of a cohesive incident response plan.
CISO November 3, 2014 Remote Wiping of Mobile Devices and Implications for Incident Response 3 min read - Lessons learned for incident response from criminals remotely wiping mobile devices seized by U.K. police.