Strategy

Strategy news, analysis, research, how-to, opinion, and video.

3 keychain keys
crisis management meeting

emmanuel macron france

Newly elected French president raises questions in trying to dupe hackers

Emerging trend of cyber deception, revealed by Emmanuel Macron, may be a slippery slope.

mobile forensics

Computer forensics follows the bread crumbs left by perpetrators

As investigators, these security pros let the clues lead them. See in a few examples how commercial software helps these techies solve the crime.

1 measure roi

10 ways CSOs can achieve ROI on a network solution

Setting up and protecting the network infrastructure is a major challenge and needs to be even more sophisticated and dynamic than ever before. Here are 10 points that need to be considered to achieve ROI and deliver payback

H-1B visa Statue of Liberty America

Cybersecurity industry braces for tighter visa rules

The current climate surrounding visas, immigrants and international travel will change the way some tech companies operate, and may harm US cybersecurity -- but there is also a chance that it will inspire more Americans to enter the...

office freelancer computer business

Humans are (still) the weakest cybersecurity link

Companies are regularly compromised by social engineering schemes, such as phishing and ransomware. Here’s what they can do prevent attacks and, if that’s too late, mitigate the damage.

wikileaks mobile

12 ways to defend the network inside and out

Wikileaks is consistently sharing information with the public that was intended to remain confidential, if not top secret, by organizations thought to have the toughest security in place. Add in the numerous other breaches reported in...

it project failures

The 7 worst automation failures

A list of the moments when technology monumentally backfired.

thinkstock privacy please

FCC privacy ruling could leave enterprises' data vulnerable

The recent repeal of new FCC rules designed to strengthen personal privacy among consumers by limiting the uses ISPs can make of their personal data also has implications for companies who use these services. Security and privacy...

manometer measure pressure

What makes a good application pen test? Metrics

Research from application security crowd testing and bug bounty program provider Cobalt attempts to define what enterprises could measure to improve results

pollution smoke energy

How CISOs can overcome cybersecurity pollution

How to assess a cybersecurity vendor in simple, unbiased and efficient manner?

burlap money bag

Enterprises misaligning security budget, priorities

Those on staff who are doing the budgeting might blindly write the same amount into the security line every year. Or the C-suite might handcuff the security personnel with a tight budget that doesn’t allow for expansion into new...

glass ceiling executive

Despite the gender barriers, women must persist in cyber

Overcoming obstacles that challenge women from entering and staying in the security industry

bug bounty

How much is a bug worth?

With recent increases in bug bounty amounts in the news, Bugcrowd shows how a bug bounty amount is calculated.

endpoint protection

10 must-ask questions for evaluating EDR tools

Are you thinking about investing in an endpoint detection and response solution? These pre-purchase questions will help you find the tool that meets your needs.

workplace violence

Workplace violence: Prevention and response

Every year nearly 2 million Americans are victims of workplace violence, which is defined as any act or threat of physical violence, harassment, intimidation or other disruptive behavior that occurs at the work site. This article will...

accusation

What's the value in attack attribution?

Does attack attribution and knowing your adversaries really matter when it comes to securing the enterprise?

CISOs

Congrats - you’re the new CISO…now what

Before you buy that new shiny product, throw that old one in the trash, hire that whiz kid dressed in black, or change that process, you need foundational visibility into your security posture regarding what’s working and what’s not....

fuel pod aircraft carrier jet

Hacking for Defense to solve national security challenges

As the speed and complexity of America's national security threats increase, so too must its response. Using Lean Startup methodologies, schools like Stanford and Georgetown University are harnessing the collective intellect of their...

Load More
You Might Also Like