verizon sign
cso50 intro

healthcare it

HIPAA compliance report card

The HIPAA data breaches immediately followed the US government's directive to push healthcare data online as part of the American Recovery and Reinvestment Act Jan 1 2014. HIPAA is a law that is implemented with IT frameworks like...

windows trouble controversy crash problem hacked

What’s up with Windows patching, Microsoft?

A month late? Seriously? It’s both outrageous and unsurprising.

board of directors

Cybersecurity: What does the board want?

Summary of the 2017 NACD Cyber-risk Handbook and its recommendations for directors. Action items for CISOs.

cybersecurity boards

Emboldening the CISO ecosystem

Cybersecurity recruitment and leadership adviser, Stephen Spagnuolo of ZRG Partners, discusses how the inaugural launch of the peer to peer HMG Strategy CISO Executive Leadership Summit will lead the way on strengthening the range,...

bingo sign

Before you buy another cybersecurity buzzword

Your security posture should not be based on assumptions. It should be based on empiric evidence. That empiric evidence can be derived by validating your controls with security instrumentation solutions. You may very well discover...

signature signing contract handwriting cursive

Hey New York - ready for CyberSOX?

If your organization is regulated by New York State’s Department of Financial Services (DFS), your organization will need to comply with a new cybersecurity regulation that goes into effect on March 1, 2017.

phone privacy

True privacy online is not viable

You can hide from casual observers, but a motivated person will see through your attempts at anonymization.


The problem with Apple's 'original' programming

Apple is trying to take on Netflix and Amazon, but its shows leave a lot to be desired.

privacy assistant app

Personalized privacy app manages smartphone permission settings

New app designed to manage privacy settings helps consolidate and tailor user permissions.

man woman decide

Who makes better cybersecurity decisions, men or women?

There’s a common perception that men and women make decisions differently. When high-risk decisions are being made, we need both genders in the room because these two approaches balance one another and the resulting decision will be...


CISOs need to keep up with the hyper pace of security

Innovations are causing a seismic shift in how we consider information security, pushing the protection of consumer payments beyond the traditional role of finance and/or IT departments to design and manufacturing of everyday products...

ransomware contained container

Ransomware is a sneaky, dangerous cyber threat

Over the past few years, ransomware has been increasing at an alarming rate, and according to various sources it is estimated that cybercriminals made around $1 billion in 2016. Hackers are becoming more sophisticated in getting...

choice key security

Better evaluations are the key for security leaders to get better tools

Mike D. Kail explains how security leaders can better evaluate security tools and avoid buying things they don’t need

diverse group of millennials holding up score card numbers

Beyond risk scoring

Risk scoring is not an end in itself once it shows up color coded and normalized between 0 and 100 in a security operations center (SOC) dashboard. To provide real value it must be supplemented by a closed-loop response process that...

teamwork trust hands

Getting buy-in to combat risk

A risk council with stakeholders from across the company could be an effective way to get needed resources to mitigate the worst security risks.

dark web hacker tablet malware

Counterterrorism analyst explains the dark web

Tips for the security news hoping to someday develop an intimate understanding of terrrorists and criminals

training room

Gartner and industry experts on the booming market for security awareness training

Training the world's employees on how to detect and respond to spear phishing and other hacks aimed at users will cost billions of dollars. But it may be the world's best ROI in the war against cybercrime - which is predicted to cost...

obstacle course climb

Security leaders need to stop limiting themselves

Ed Snodgrass shares his experience in building relationships necessary to get engaged at all levels of the business in a way that improves security

Load More