Risk Management April 6, 2017 Can Cyber Situational Awareness Prevent the Next Black Swan Cyber Event? 4 min read - Security analysts cannot predict black swan events, but they can estimate the likelihood of a damaging breach through cyber situational awareness.
Cloud Security March 30, 2017 Do We Need to Worry About Shadow IT? 2 min read - Shadow IT is still a challenge for organizations. Security leaders should provide users with the tools they need and monitor unsanctioned use carefully.
Identity & Access March 17, 2017 Identity and Access Governance: Lessons From the Front Line 3 min read - Identity and access governance is not a technology project — it's a business transformation program. Organizationwide buy in is critical.
Data Protection March 13, 2017 The Enterprise Mobility Conundrum: How to Control the Data? 3 min read - Businesses can benefit from BYOD policies, but IT leaders must implement the right enterprise mobility solutions to protect their sensitive data.
March 9, 2017 New Security Ratings Could Help Bolster User Confidence 2 min read - The decision by Consumer Reports to include security ratings in its product reviews could have implications for the way connected devices are designed.
CISO March 9, 2017 Nine Security Practices That May Not Be Effective 3 min read - Many common security practices and widely used tools such as firewalls and IDS fail to adequately address the challenges IT professionals face today.
CISO March 6, 2017 Building a Cybersecurity Culture Around Layer 8 4 min read - IT leaders must develop a strong cybersecurity culture to promote awareness and accountability, and to empower employees to learn and develop.
Risk Management February 23, 2017 The Best Defense Is a Good Offense: The Value of User Education 2 min read - User education and online safety training can be invaluable weapons against cyberthreats, especially for IT teams that are short on resources.
Data Protection February 20, 2017 Blurred Lines: Make Security Personal 2 min read - IT managers must make security personal to encourage employees in their organizations to adopt better security practices and improve their online hygiene.
Fraud Protection February 16, 2017 It’s Time for Users to Pony Up and Quit Reusing Passwords 4 min read - By reusing passwords across multiple services, users make it easier for cybercriminals to breach all their accounts, not to mention company databases.