The modern CSO: Future-proofing your organization in a disruptive world
“There are three essential skill sets a modern day CSO must have. The first is knowledge of the business to better align a security strategy to company objectives …
Data guides the new security perimeter
A recent Kaspersky Lab report finds data breaches now cost enterprises more than $1.2 million. The report also finds that the success of digital transformation projects are …
Managing and maintaining security in the enterprise
In the digital age, more often than not, organizations are playing defense against cybercrime. In fact, a report from Online Trust Alliance shows businesses reported 159,700 …
Has your security evolved to counter Ocean’s Eleven of threat scenarios?
In assessing how the cyber threat and mitigation landscape has evolved over time, I often think of the ways that “cops and robbers” movies have changed: In the old days, a …
Why cybercriminals are turning to cryptojacking for easy money
The cryptocurrency market has seen an incredible amount of attention and hype over the last year, culminating with Bitcoin values soaring by more than 1,300 percent in 2017. …
Working through the cybersecurity skills gap
It’s no secret that there’s a shortage of qualified personnel in the field of cybersecurity. It’s a problem that has long been noticed and one that is projected to get even …
What CISOs can learn from Tyrion on Game of Thrones
Game of Thrones is a gripping, global phenomenon. One of the main reasons for its popularity is its nuanced portrayal of characters who are not 100% good or evil. Over seven …
GDPR: Today is the day
Today is the day many organizations around the world have been preparing for. As GDPR becomes enforceable, we sat down with Jerry Caponera, VP Cyber Risk Strategy, Nehemiah …
Security spring cleaning: Tidying up messy firewall rules to reduce complexity
Most security teams are waging a daily battle against complex IT infrastructures, advanced malware and a severe skills shortage – a trifecta that has forced them to tackle …
Fighting ransomware with network segmentation as a path to resiliency
Recent cybersecurity events involving the use of ransomware (WannaCry and similar variants) represent the latest examples highlighting the need for organizations to not only …
The ethical and legal dilemmas of threat researchers
Threat intelligence is mainstreaming into a de-facto everyday tool of cyber-defense. But all that intelligence must be collected, analyzed, and prepared by someone. Enter …
Social media: The zero-trust game
Our value today is measured in numbers. Followers, connections, likes, tweets, and impressions now count toward not only the value of our opinions but also quantify our sphere …
Don't miss
- This is the year CISOs unlock AI’s full potential
- How AI and ML are transforming digital banking security
- UK domain registry Nominet breached via Ivanti zero-day
- Attackers are encrypting AWS S3 data without using ransomware
- EU law enforcement training agency data breach: Data of 97,000 individuals compromised