Security leaders must tailor their security awareness training programs to the particular needs and goals of the employees in their departments.
To make user security training more effective, IT leaders must engage employees with a more creative — and less boring — approach.
Security is often viewed as a technology problem, but many vulnerabilities can be traced back to flaws and inconsistencies in organizational behavior.
Phishing attacks used to be the work of hobbyists, but now professional fraudsters are leveraging stolen credentials to compromise multiple accounts.
Data security is being put at risk through unsafe business practices, so IT managers must do more to keep enterprise information safe.
If you're writing down your passwords on adhesive notes or in a journal, you might need a refresher on password security best practices.
Security analysts cannot predict black swan events, but they can estimate the likelihood of a damaging breach through cyber situational awareness.
Shadow IT is still a challenge for organizations. Security leaders should provide users with the tools they need and monitor unsanctioned use carefully.
Identity and access governance is not a technology project — it's a business transformation program. Organizationwide buy in is critical.
Businesses can benefit from BYOD policies, but IT leaders must implement the right enterprise mobility solutions to protect their sensitive data.