Risk Management May 30, 2018 The Compliance Crisis: A Compliance Officer Faces an Outdated Risk Management Framework 5 min read - Follow along with risk and compliance officer Frank Roth as he endeavors to fill in the gaps of an outdated (and incomplete) risk management framework in his new role at a utility company.
Cloud Security May 21, 2018 Spotlight Your Data Within Shadow IT 2 min read - A managed cloud access security broker (CASB) can help organizations gain visibility into shadow IT by monitoring all data transferred between the cloud and on-premises infrastructure.
Intelligence & Analytics May 10, 2018 Cut Through the Fog: Improve Cloud Visibility to Identify Shadow IT 3 min read - Security teams need a single, scalable cloud solution that integrates seamlessly with a SIEM platform to identify shadow IT — and cut through the fog of cloud security.
April 16, 2018 Nearly 4 in 10 IT Professionals Struggle to Detect and Respond to Cloud Security Incidents 2 min read - A recent survey revealed that nearly 40 percent of cybersecurity professionals struggle to detect and respond to cloud security incidents.
Intelligence & Analytics April 11, 2018 It’s Time to Bring Cloud Environments Out of the Shadows 3 min read - Business leaders often rush to migrate corporate assets to cloud environments to boost productivity and lower costs, but adopting cloud services without proper oversight can put data at risk.
CISO December 29, 2017 Transform Your Security Strategy to Avoid Digital Roadblocks 3 min read - To transform your security strategy, you must first establish a model of shared responsibility between security professionals and business units throughout the organization.
Cloud Security December 5, 2017 Bringing Shadow IT Into the Security Light 2 min read - Shadow IT is created by employees accessing cloud services without prior approval, and it can be devastating to your enterprise's security posture.
Identity & Access November 7, 2017 Access Management Resolution: Consolidating Actionable Access Data on a Single Pane of Glass 3 min read - Using several disparate tools for access management can create a fractured view of access data, decrease productivity and promote insecure behaviors.
November 6, 2017 Business Leaders Must Wake Up to the Risk of Shadow IT 2 min read - According to a recent survey by Symantec, the risk posed by shadow IT is growing, and CIOs are in denial about the scale of the problem.
Application Security May 22, 2017 Incorporate Application Security Checks and Balances Into Your Organization’s Citizen Developer Initiatives 3 min read - Citizen developer programs can reduce costs and boost efficiency, but they require heightened vigilance when it comes to application security.