4 frameworks you need to protect your digital enterprise against the latest cybersecurity threats

4 frameworks you need to protect your digital enterprise against the latest cybersecurity threats

Cybersecurity attacks are getting vicious, expensive and bringing entire businesses to their knees. CIOs and CISOs don’t have time to reinvent the wheel and should adapt US Government and Department of Defense lighthouse frameworks...

4 reasons why CISOs must think like developers to build cybersecurity platforms and stop investing in ‘silver bullets’

4 reasons why CISOs must think like developers to build cybersecurity platforms and stop investing in ‘silver bullets’

The Chief Information Security Officer is the latest addition to the C-suite with funding, staff and authority to ensure the confidentiality, integrity and availability of corporate digital assets. The CISO must quickly shed the...

DOD releases new guidance to protect data within the supply chain

DOD releases new guidance to protect data within the supply chain

Companies supplying products and services to the US Department of Defense must meet 110 security requirements specified in NIST SP 800-171 or risk losing contract awards through a new set of risk scoring guidelines. The new rules...

Driving cybersecurity and digital transformation with cloud technologies

Driving cybersecurity and digital transformation with cloud technologies

Enterprises – especially in regulated industries – need to demonstrate compliance with NIST, HIPAA and GDPR to address an increasing set of privacy and cybersecurity threats. Cloud computing platforms provided a ready-made solution,...

4 steps to creating a winning cybersecurity strategy in 2018

4 steps to creating a winning cybersecurity strategy in 2018

For mid-sized organizations and enterprises looking to focus on cybersecurity issues in 2018, here is a proven playbook to help creating a winning strategy.

Secdevops or devsecops or devops next-generation (NG) – What is your take on devops?

Secdevops or devsecops or devops next-generation (NG) – What is your take on devops?

Should devops adapt to include and incorporate new technologies and expand the community of practitioners?

Is compliance the best insurance for managing cybersecurity risk in 2018?

Is compliance the best insurance for managing cybersecurity risk in 2018?

Cybersecurity challenges and risks continue to emerge as top threats to business as usual for large and small organizations alike. The ability to meet these threats requires understanding emerging standards. Compliance with these new...

Department of Defense contractors must implement IT security controls by December 31

Organizations doing business with the U.S. Department of Defense (DOD) must demonstrate their ability meet higher levels IT security for their corporate network and systems by Dec. 31, 2017 or risk losing business.

Is it time for continuous ‘IV&V’ to ensure cloud security?

Is it time for continuous ‘IV&V’ to ensure cloud security?

Operating securely in the cloud requires a strong and independent security organization that is well equipped to detect and remediate threats in real-time. This requires adequate levels of funding, tooling and empowerment to ensure...

Top Blog Posts