Data Protection October 5, 2017 Guarding the Crown Jewels: The Importance of Intellectual Property Security in the Age of Sprawl 4 min read - Intellectual property security is crucial to any company's bottom line. IT teams must locate this data, asses its risk and adjust policies accordingly.
CISO October 4, 2017 Fasten Your Seat Belt: Accelerating Your Digital Transformation Through Collaboration 3 min read - Cybersecurity is like a seat belt: While uncomfortable at first, it is crucial to the safety of your organization as it undergoes a digital transformation.
CISO October 3, 2017 Cybersecurity Strategy, Risk Management and List Making 3 min read - A framework such as the NIST CSF can help security professionals determine where to start when developing a cybersecurity strategy.
Risk Management October 3, 2017 Basic Security Tools You Cannot Afford to Miss in Your Risk Management Program 5 min read - Security professionals can leverage freely available, open source security tools to protect their environments from threats.
Risk Management September 28, 2017 Six Key Traits of an Effective Cyber Risk Advisor 4 min read - What makes a good cyber risk advisor? Here are six traits and abilities that you should look for in a trusted security advisor.
Banking & Finance September 26, 2017 Vulnerabilities Across Verticals: Overcoming Industry-Specific Security Challenges 3 min read - Security leaders in the health care, financial services, and energy and utilities sectors must pay special attention to industry-specific security risks.
CISO September 25, 2017 From the Starship Enterprise to Your Enterprise: Eight Cybersecurity Lessons From ‘Star Trek’ 5 min read - To prepare for the upcoming "Star Trek: Discovery" series, here are eight cybersecurity lessons companies can learn from the science fiction franchise.
Cloud Security September 22, 2017 The Cloud Security Risks Hidden in Plain Sight 2 min read - Organizations must pay closer attention to cloud security risks, such as third-party access and human error, that are hiding in plain sight.
CISO September 21, 2017 When Responding to a Data Breach, Cooperation Is Nine-Tenths of the Law 3 min read - When responding to a data breach, the CISO must work closely with the legal department to minimize the risks of litigation and reputational damage.
Application Security September 20, 2017 Don’t Sweep Web Application Penetration Testing Under the Rug 3 min read - Although it is one of the most crucial components of any security strategy, web application penetration testing is often neglected.