CISO October 12, 2016 For Enterprise Security, Disruption Doesn’t Have to Be Disruptive 2 min read - Disruption can be productive when it comes to enterprise security. Disruptive technologies prompt established players to adapt and improve.
CISO August 30, 2016 Dealing With Third-Party Vendor Connections in Your Network 3 min read - While most third-party vendor connections are harmless and well-intentioned, they can act as footholds for attackers to gain access to your network.
Risk Management May 26, 2016 Merger Considerations Must Involve Cybersecurity 2 min read - Merger considerations need to be expanded to include cybersecurity and systems concerns, security audits, third-party SLAs and more.
Application Security May 12, 2016 Know Your Vendor Security Practices 2 min read - When you hire a third party for some IT work, do you really know about their vendor security practices? Google certainly does.
August 21, 2015 Why Security Is Becoming a Big Piece of the IT Outsourcing Market 2 min read - A new report from Computer Economics indicated that organizations are devoting larger portions of their budgets to IT outsourcing.
Intelligence & Analytics August 12, 2015 Extending the Reach of Cybersecurity 2 min read - Service providers can help SMBs employ excellent cybersecurity through specialized practice, shaping themselves into hubs of security competencies.
Fraud Protection July 16, 2015 Third-Party Insiders: Compliance as the First Step to Trust 2 min read - Third-party insiders are vital to organizations, but you must apply security management and compliance controls to these workers before building trust.
June 9, 2015 Game Over? Plug-In Flaw Targets Gamer Data 3 min read - A flaw in the Unity Web Player plug-in puts gamer data at risk, but this is just the tip of the iceberg. How do companies defend against plug-in problems?
X-Force May 22, 2015 When Vendor Security Vulnerabilities Become Your Own 3 min read - Vendor security vulnerabilities can quickly become a major problem for your business, and it's up to you to minimize the risks involved.
Application Security May 21, 2015 Does the VENOM Vulnerability Affect You? 4 min read - The VENOM flaw is the latest security vulnerability to come to light. But are you at risk? And how should you react if your data is suceptible to attacks?