Most organizations are unable to resolve a cyber attack
The lack of incident detection and investigation puts companies and their CISOs’ jobs at significant risk, according to a new Ponemon Institute study. In fact, when a …
Best practices to help prevent online data breaches
The Online Trust Alliance (OTA) recommended a series of best practices to help prevent online data breaches and other exploits. Leveraging preliminary year-end data from the …
Key security program and budget data for CISOs
Benchmarking against similar organizations provides IT leaders with powerful tools to analyze departmental performance and gain executive management support. Since no …
What are the building blocks of security culture?
In order to understand how to create security culture, it is important to know what it is and how we define it, so that we can look beyond the basics. Taking into …
Federal agency cloud adoption increases 400%
Tripwire announced the results of a survey on cloud security technology trends in the federal government. The survey evaluated the attitudes of more than 100 federal …
CIOs must lead the move to transform government services
Faced with relentless pressure to reduce costs and improve the performance of government agencies, CIOs must choose between maintaining current operations or transforming …
How competitive is your cybersecurity team?
SecureWorld Insight, a partnership with Ponemon Institute and SecureWorld Expo, identified compensation for eight categories of information security staff – from CISOs …
What CIOs can expect in 2014
While the 3rd platform of mobile, social, big data, and cloud services is just beginning to mature, it will require an entirely different set of IT skills and roles — many of …
Overcoming the data privacy obstacle to cloud based test and development
How many times have data security and privacy constraints brought your key application development initiatives to a screeching halt? It usually occurs right around the time …
Innovations that will shape network security
Headline after headline, some company reports a cyber incident and hangs its head in shame. While it is disappointing, strong businesses have strong leaders that show us how …
The enemy within
Recent high-profile cases in the press have called attention to the threat the trusted insider can pose to the security of an organization. A recent survey highlighted that …
A look at security effectiveness by industry
BitSight analyzed security ratings for over 70 Fortune 200 companies in four industries – energy, finance, retail and technology. The objective was to uncover …
Featured news
Resources
Don't miss
- How military leadership prepares veterans for cybersecurity success
- Fighting fraud with AI: The new identity security playbook
- Brute-force attacks hammer Fortinet devices worldwide
- For $40, you can buy stolen police and government email accounts
- Vulnerabilities in MSP-friendly RMM solution exploited in the wild (CVE-2025-8875, CVE-2025-8876)