How long is the wait?
Does this question sound familiar? You have probably asked this question several times. Nobody likes to wait. But yet, we wait at restaurants, to see the doctor, and to get …
APTs: The fine balance of control and monitoring
Security is not about winning the war. It is more like insurance, it’s about how we handle risks. In order to successfully handle the risk of Advanced Persistent Threats …
CTO insights: Defending your organization from insider attacks
If you’ve read enough crime novels or seen enough action movies, the plot is all too familiar to you: an insider – acting to correct some slight or insult he or she received …
C-level executives are less confident than their boards or IT execs
A new Dimensional Research study examined corporate executives’ view of cybersecurity risks, as well as measured their confidence and preparedness in the event of a security …

High-profile data breaches made most CEOs re-examine security programs
There has been increased board- and C-level interest in information security programs in light of recent high-profile data breaches such as those affecting Sony, Anthem and JP …
The key challenges to timely incident response
Security professionals are inundated with security incidents, averaging 78 investigations per organization in the last year, with 28 percent of those incidents involving …
Boards must up their game before the hackers claim checkmate
In today’s climate, the cyber security paradigm is a reactive cycle. When a threat is uncovered, it is examined and a counter-measure is created, with response times …
I don’t need friends, I have followers
Admittedly, I didn’t really mean to utter those words but found them coming out of my mouth nonetheless. Well what else do you say when an eight year old ridicules you …
10 practical security tips for DevOps
More organizations are embracing DevOps and automation to realize compelling business benefits, such as more frequent feature releases, increased application stability, and …
Banks and IT security: The elements of success
In this interview, Nathan Horn-Mitchem, VP, Information Security Officer at Provident Bank, talks about delivering and maintaining IT security for 80 branches of the bank, …
Implementing an effective risk management framework
In today’s marketplace, almost every employee is now a content contributor. Although beneficial to the collective of information available, this influx brings about new …
Four advantages of an identity behavior-based approach to cybersecurity
With an ever-increasing number of data breaches, more money is being poured into IT security budgets. According to Gartner, the average global security budget increased 8 …