security ROI

The most effective security strategies to guard sensitive information
Today’s enterprise IT infrastructures are not largely hosted in the public cloud, nor are they SaaS-based, with security being the single largest barrier when it comes to …

Cyber risk management and return on deception investment
This article is fifth in a five-part series being developed by Dr. Edward Amoroso in conjunction with the deception technology team from Attivo Networks. The article provides …

Shifting the burden: Long-term magnifying consequences
Computer geeks love their acronyms. Here’s one more: TANSTAAFL. There ain’t no such thing as a free lunch. No, I’m not talking about the grilled Alaskan salmon meal you …

How to make the CFO your best cybersecurity friend
I’m bad dinner company. As the CFO of a cloud technology provider, I like to speak about finance and cybersecurity, two topics entirely capable of putting my dinner guests to …

Key obstacles in enterprise security budgeting
IANS released its latest findings on budget-related best practices for information security leaders to consistently command the budget and resources they need. “It’s part of …

How to improve your security infrastructure when you’re on a budget
When you’re on a tight budget for cybersecurity, it can seem almost impossible to secure every part of your businesses’ network without going over budget with the …

Poor communication between CEOs and technical officers leads to misalignment
A misalignment between CEOs and technical officers is weakening enterprise cybersecurity postures, according to Centrify. CEOs are incorrectly focused on malware, creating …

Most decision makers expect ROI from artificial intelligence within two years
Cylance polled 652 IT decision makers in the U.S., UK, Germany and France, and found that optimism about the value of artificial intelligence-powered solutions in the …

Which security investments make a difference?
Costly cyber attacks are having a significant and growing financial impact on businesses worldwide. According to Accenture and the Ponemon Institute, in 2017 the average cost …

Can you justify your security spend?
In this podcast recorded at RSA Conference 2017, Todd Bramblett, President of Nehemiah Security, talks about why cyber risk has become such a hot topic, the importance of IT …

How to implement an EFSS ransomware recovery plan
Ransomware attacks are at an all-time high, and security experts warn it has become a matter of “when” not “if” your company will be breached. The number of victims has grown …

How cybersecurity mismanagement can destroy value
Cyber security remains a critical business challenge and a growing concern with a potentially devastating impact on company brands and bottom lines. Despite these damaging …
Featured news
Sponsored
Don't miss
- Sumo Logic discloses potential breach via compromised AWS credential
- Marina Bay Sands breach exposed data of 665,000 customers
- The 3 key stages of ransomware attacks and useful indicators of compromise
- Aqua Trivy open-source security scanner now finds Kubernetes security risks
- AI-assisted coding and its impact on developers