CISO October 29, 2018 Strengthening Industry Collaboration Through the Charter of Trust for a Secure Digital World 3 min read - Under the Charter of Trust, limiting the impact of digital transformation and cybersecurity and building trust for users has to be the result of close collaboration at all levels.
Network October 26, 2018 Is Malware Analysis Right for Your Business? 2 min read - For companies that want to understand what is happening in their networks but lack malware analysis tools, using what is publicly available could be the difference between an infection and a crisis.
CISO October 19, 2018 How to Create Better Security Awareness Content for Your Employees 4 min read - Despite increased security awareness training efforts, human error is still responsible for the majority of data breaches today.
Intelligence & Analytics October 9, 2018 How to Avoid the Trap of Fragmented Security Analytics 2 min read - To move toward deep, advanced security analytics, CISOs should replace their fragmented tools with a platform-based approach that can leverage a broad set of data.
Identity & Access October 9, 2018 Out With the Old, In With the New: Separation of Duties the Right Way 3 min read - The capacity to express technical IT concepts in business terms is critical to a better, more informed decision-making process when it comes to user access and separation of duties.
Healthcare October 5, 2018 Why Healthcare Cyberattacks Should Be a Concern for Consumer Data Collectors 3 min read - Personal health information is extremely valuable to threat actors, and companies that store customers' health data need to be wary of healthcare cyberattacks that could threaten their business.
Data Protection October 3, 2018 The Wild West of Data Risk Management in the Age of Cloud, Mobile and Digital Transformation 3 min read - In today's rapidly evolving security environment, it's imperative for organizations to establish a formal data risk management program that does more than just check the boxes.
Software Vulnerabilities September 13, 2018 New Gartner Report Recommends a Vulnerability Management Process Based on Weaponization and Asset Value 2 min read - Gartner's new report recommends factoring severity, asset value and active exploits into your vulnerability management process.
September 4, 2018 More Than a Quarter of Executives View Security Investments as Having a Negative ROI < 1 min read - A new report found that more than one-quarter of business executives view security investments as having a negative return on investment (ROI).
CISO September 4, 2018 Less Is More: Why CISOs Should Consolidate Their Security Tools 3 min read - CISOs need a broad range of security tools to fulfill their growing list of responsibilities. The more they can consolidate these solutions, the easier they are to manage and monitor.