A reference resource for the CIO and the CISO on cyber security, looking beyond the technology horizon into leadership, management, culture, governance, resilience and the real dynamics of security transformation
Organizations of all sizes grapple with the daunting reality of potential vulnerabilities, malicious actors, and unforeseen challenges that threaten the integrity of their company.
A coalition of cyber insurance associations has pledged to back fresh government cybersecurity guidance designed to help victims avoid ever paying a ransom as part
The quantum computing market boom has sparked concerns about the vulnerability of our current public-key cryptography algorithms, putting sensitive data integrity at risk.
Over the past decade, the ecosystem of Cybercrime-as-a-Service (CaaS) has really evolved and added several challenges to monitor this crime. One such challenge is that not one single threat actor executes one attack from beginning to end
Smaller businesses are in the crosshairs of cyber criminals and with attacks on the rise, now is not the time for misplaced confidence in your defenses.
Working together and integrating cybersecurity as part of our corporate and individual thinking can make life harder for hackers and safer for ourselves.
Given competing pressures and priorities, CIOs and CISOs often find themselves at odds. Knowing where tensions flair and how your partner operates is essential to maintaining a productive partnership.
With ransomware at an all-time high, companies need to understand that being cyber resilient means going beyond compliance to considering all aspects of a business, from operational continuity to software supply chain security.
Cybersecurity Expert Joseph Steinberg says that given the SEC's new cybersecurity disclosure rules—and recent charges against the CISO of SolarWinds—there is plenty at stake for companies that do not adequately oversee the management of their cyber risk.'
Experts at this year's RSA Conference offered strategies to help CISOs cope with the prospect of facing federal indictments over their handling of cyber incidents.
Zero-trust security should be seen as a strategy to protect high-value assets and is not tied to a specific technology or product, says the model’s creator John Kindervag
CISOs can avoid being liable for data breaches by following legal advice, communicating effectively with internal and external stakeholders, and demonstrating commitment to avoid future incidents.
Those who understand “1s & 0s”need to explain to those who work in “dollars & cents” that the cyber-criminal world is evolving into a multi-tiered business structure that rivals their corporate structures
To get content containing either thought or leadership enter:
To get content containing both thought and leadership enter:
To get content containing the expression thought leadership enter:
You can enter several keywords and you can refine them whenever you want. Our suggestion engine uses more signals but entering a few keywords here will rapidly give you great content to curate.