Incident Response February 15, 2017 Before, During and After: Dealing With Attacks and Applying Effective Incident Management 3 min read - A planned, communicated, rehearsed and organizationally tailored incident management program is central to an effective security strategy.
February 13, 2017 Threat Hunting Is a Top Security Priority for 2017 2 min read - According to a recent survey, threat hunting has moved to the top of security professionals' agenda in response to the ever-growing volume of cyberattacks.
CISO February 8, 2017 NACD Publishes Five Cybersecurity Principles Every Board Director Needs to Know 5 min read - NACD updated its "Director's Handbook on Cyber-Risk Oversight," which included five new cybersecurity principles for boards of directors.
February 6, 2017 Executives Must Wake Up to the Value of Risk Management Strategy 2 min read - According to the results of a recent Ponemon Institute survey, 76 percent of organizations lack a holistic risk management strategy.
Risk Management February 3, 2017 Highlights From the World Economic Forum’s ‘Global Risks Report 2017’ 2 min read - The lack of concern for cyber issues reflected in the World Economic Forum's "Global Risks Report 2017" speaks to a worldwide lack of security awareness.
Data Protection February 3, 2017 Does Security Travel With Your Data? Three Tips for Protecting Cloud-Bound Sensitive Data 3 min read - To move sensitive data securely to the cloud, establish a data-centric philosophy and approach to security and apply it across all platforms.
Endpoint February 2, 2017 Is IoT Security an Oxymoron? 3 min read - As the Internet of Things continues to expand, IT leaders must prepare accordingly or find themselves vulnerable to countless IoT security threats.
Data Protection January 23, 2017 IBM Plans to Acquire Agile 3 Solutions to Help Executives Manage Their Critical Data < 1 min read - IBM recently announced its plan to acquire Agile 3 Solutions, a leader in business risk dashboarding and data visualization.
Application Security January 20, 2017 Application Security Testing: Resurgence of DAST for SDLC Integration and Scan Automation 7 min read - The sooner a vulnerability is found, the cheaper it is to fix. Developers can spot defects early by integrating application security testing into the SDLC.
January 18, 2017 Focus on People and Technologies to Manage Health Care Security Risks Through 2017 2 min read - IT leaders must plan meticulously, train employees thoroughly and strike the right balance between software and services to shore up health care security.