Cloud Security September 22, 2017 The Cloud Security Risks Hidden in Plain Sight 2 min read - Organizations must pay closer attention to cloud security risks, such as third-party access and human error, that are hiding in plain sight.
CISO September 21, 2017 When Responding to a Data Breach, Cooperation Is Nine-Tenths of the Law 3 min read - When responding to a data breach, the CISO must work closely with the legal department to minimize the risks of litigation and reputational damage.
Application Security September 20, 2017 Don’t Sweep Web Application Penetration Testing Under the Rug 3 min read - Although it is one of the most crucial components of any security strategy, web application penetration testing is often neglected.
CISO September 18, 2017 No Time for Techno-Babble: Four Key Traits of Quality CISO Reports 6 min read - CISO reports must clearly illustrate how cybersecurity relates to business objectives in a way that board directors can understand.
Healthcare September 15, 2017 Increased Awareness Is the Best Cure for Health Care Security Risks 2 min read - Many health care security risks stem from insufficient leadership and limited resources, which can often be attributed to a lack of security awareness.
Data Protection September 14, 2017 See No Data, Hear No Data, Speak No Data: Overcoming the Challenges of Risk-Focused Data Management 3 min read - A risk-focused data management program can help companies identify and protect their prized assets from attackers aiming to steal, publish or destroy them.
Risk Management September 11, 2017 CTRL-ALT-DELETE Before You Leave Your Seat! Security Awareness and Training Through Positive Reinforcement 3 min read - Security leaders should infuse positive reinforcement into their security awareness and training programs to encourage users to adopt best practices.
CISO September 8, 2017 Money Talks: Speaking the Language of Money to Boost Security Awareness Among CEOs 2 min read - CEOs often lack security awareness because IT professionals fail to communicate risks in the context of the organization's bottom line.
Intelligence & Analytics September 7, 2017 Is Your Company Secure by Design? Aligning Security With Business Objectives 2 min read - The key to aligning security with business objectives is to make assets secure by design, which gives analysts sufficient visibility to respond to threats.
Network August 30, 2017 Keep Intruders Out of Your Network With Proactive Threat Hunting 3 min read - Threat hunting promotes a proactive approach to security monitoring and incident response, making it harder for intruders to breach your network.