What security leaders need before applying intelligence to cyber

What security leaders need before applying intelligence to cyber

John Boling lines up for a Security Slapshot on how security leaders can successfully apply intelligence to avoid failure

05/24/17

Why existing solutions let security leaders maximize value

Why existing solutions let security leaders maximize value

Eddy Bobritsky explains why existing solutions create the opportunity to maximize value before looking for something new

05/17/17

Are venture capitalists the new stewards of modern security research and development?

Are venture capitalists the new stewards of modern security research and development?

Is the innovation you seek available from the security startup you don’t know about yet?

05/11/17

Security leaders can unite the business around identity

Security leaders can unite the business around identity

Kevin Cunningham shares insights on why identity is a smart way to bring your business colleagues together to support security efforts

05/09/17

Debating the impact of marketing on the security industry

Debating the impact of marketing on the security industry

Jennifer Leggio winds up for the launch of the new Security Slapshot series with some bold statements on the impact of marketing on the security industry

05/04/17

A pathway for security leaders to finally enforce least privilege

A pathway for security leaders to finally enforce least privilege

Jonathan Sander explains how to automate the process of enforcing least privilege on the files raging on your network

05/03/17

Security leaders need to sprint before getting forced to scramble

Security leaders need to sprint before getting forced to scramble

Udi Mokady shares insights on the changing nature of security threats and how a focused sprint now builds trust and sets the stage for future success

04/19/17

How security leaders can resolve the tension of a mandate without authority

How security leaders can resolve the tension of a mandate without authority

Brandon Hoffman shares insights and experience on how to approach security to get results with less conflict

03/24/17

Shift your perspective on cybercrime to realize how well you’re doing

Shift your perspective on cybercrime to realize how well you’re doing

Absolute numbers often suggest a serious impact that demands attention. When we learn to shift our perspective, however, sometimes we find a far better story than we expected.

03/21/17

Why security leaders need to embrace rapid detection

Why security leaders need to embrace rapid detection

Patrick Dennis shares insights on the changing nature of endpoint protection and the resulting need for rapid detection matched to confident action

03/14/17

Better evaluations are the key for security leaders to get better tools

Better evaluations are the key for security leaders to get better tools

Mike D. Kail explains how security leaders can better evaluate security tools and avoid buying things they don’t need

02/15/17

Security leaders need to stop limiting themselves

Security leaders need to stop limiting themselves

Ed Snodgrass shares his experience in building relationships necessary to get engaged at all levels of the business in a way that improves security

02/09/17

Security leaders that help startups get traction reap the rewards

Security leaders that help startups get traction reap the rewards

Chris Camacho shares his experience helping startups get traction in the enterprise, the benefits it creates for the industry, and how it helps security leaders advance their careers

02/01/17

Why security leaders need to include financial health when assessing security risk

Why security leaders need to include financial health when assessing security risk

James Gellert explains the importance of financial health and what to look for when assessing third parties and partners

01/25/17

Using threat modeling to prove security success

Using threat modeling to prove security success

Archie Agarwal shares experience and insights on how to move threat modeling from a confusing exercise to a powerful tool for security leaders

01/19/17

Do we really need higher education to solve our perceived and actual security needs?

Do we really need higher education to solve our perceived and actual security needs?

John Boling shares the path he took to security leadership and reflects on what we really need to attract and train the workforce to advance security

01/10/17

What the Florida ruling on passwords actually means for security leaders

What the Florida ruling on passwords actually means for security leaders

Shawn Tuma explains the rationale of the case and offers insights on potential implications to prepare security leaders for productive executive updates

01/05/17

Security leaders hindered by lack of automation to respond to incidents

Security leaders hindered by lack of automation to respond to incidents

Vincent Geffray shares insights gained from a new survey assessing the ability of leaders to respond to IT outages and security incidents with suggestions on where to focus for rapid improvement

01/03/17

When your threat intelligence just isn’t producing value you need to pivot

Josh Lefkowitz of Flashpoint shares his experience leading the pivot from threat intelligence to business risk intelligence and explains the enterprise benefit for security leaders

12/13/16

Why security leaders need to embrace the concept of reasonable security now

Why security leaders need to embrace the concept of reasonable security now

Vanessa Henri explains the legal definition of reasonable security and why now is the time to embrace the concept and prepare

12/06/16

Load More