Application Security March 1, 2017 Viva Las Vegas, and Viva Effective Application Security Testing Practices! 2 min read - At IBM InterConnect, attendees will learn how to apply cognitive solutions to keep their application security testing programs one step ahead of threats.
CISO February 22, 2017 Time to End the Tension Between Corporate Remediation and Security Teams 2 min read - Although remediation and security teams are working toward a common goal, their conflicting priorities, culture and tools often lead to discord.
Incident Response February 15, 2017 Before, During and After: Dealing With Attacks and Applying Effective Incident Management 3 min read - A planned, communicated, rehearsed and organizationally tailored incident management program is central to an effective security strategy.
February 13, 2017 Threat Hunting Is a Top Security Priority for 2017 2 min read - According to a recent survey, threat hunting has moved to the top of security professionals' agenda in response to the ever-growing volume of cyberattacks.
CISO February 8, 2017 NACD Publishes Five Cybersecurity Principles Every Board Director Needs to Know 5 min read - NACD updated its "Director's Handbook on Cyber-Risk Oversight," which included five new cybersecurity principles for boards of directors.
February 6, 2017 Executives Must Wake Up to the Value of Risk Management Strategy 2 min read - According to the results of a recent Ponemon Institute survey, 76 percent of organizations lack a holistic risk management strategy.
Risk Management February 3, 2017 Highlights From the World Economic Forum’s ‘Global Risks Report 2017’ 2 min read - The lack of concern for cyber issues reflected in the World Economic Forum's "Global Risks Report 2017" speaks to a worldwide lack of security awareness.
Data Protection February 3, 2017 Does Security Travel With Your Data? Three Tips for Protecting Cloud-Bound Sensitive Data 3 min read - To move sensitive data securely to the cloud, establish a data-centric philosophy and approach to security and apply it across all platforms.
Endpoint February 2, 2017 Is IoT Security an Oxymoron? 3 min read - As the Internet of Things continues to expand, IT leaders must prepare accordingly or find themselves vulnerable to countless IoT security threats.
Data Protection January 23, 2017 IBM Plans to Acquire Agile 3 Solutions to Help Executives Manage Their Critical Data < 1 min read - IBM recently announced its plan to acquire Agile 3 Solutions, a leader in business risk dashboarding and data visualization.