Technology Industry

Technology Industry news, information, and how-to advice

Dana Deasy
4 shock stunned fear

baby working on a laptop

The immature security industry

The security industry often tries to do everything instead of putting focus on a singular area where we can make a real difference. This is a sign of an immature industry.

healthcare security

Is your organization a HITRUST org?

For good reason, there's now more focus on regulatory compliance for healthcare—which also includes a multitude of vendors and business associates to manage risk for and meet or exceed the Health & Human Services (HHS) compliance...

cyber crime cybersecurity

Implementing the NIST cybersecurity framework could be worth at least $1.4m to your business

While there are many other frameworks available, the NIST CSF provides a nationally recognized guideline as you scale your business and cybersecurity program.

cyberwarfare defense illustration

Nation state attacks – the cyber cold war gets down to business

Cyber weaponry is moving to new frontiers: yours. Businesses are the next target on the nation state menu. Are you protected or vulnerable?

networking wan

Overcoming the security challenges of software defined networking

SD-WANs potentially offer many compelling benefits. However, the result is that organizations have less knowledge about the infrastructure that is being used.

Facebook Data Debacle - Android

Breaking down Facebook’s communications playbook

Lessons learned from Facebook’s response to its data privacy crisis, and how you can use them to protect your own reputation – even if you aren’t a tech giant.

security

Left-shifting enterprise appsec: what we can learn from mobile app developers

Multiple, concurrent innovations in enterprise application development present the opportunity to improve application security by “left-shifting” it to the beginning (and throughout) the dev cycle. Mobile app developers have to a...

children classroom laptops students thinkstockphotos 617577684

Technology must be part of solution for empowering rural women and girls

United Nations addresses challenges to create and expand economic opportunity for rural women and girls, but the world must commit to technology-driven solutions. And as we face increasing cyberthreats, shouldn’t women be part of the...

cloud security ts

Driving cybersecurity and digital transformation with cloud technologies

Enterprises – especially in regulated industries – need to demonstrate compliance with NIST, HIPAA and GDPR to address an increasing set of privacy and cybersecurity threats. Cloud computing platforms provided a ready-made solution,...

balance - measure - comparison - risk assessment

Want IT resiliency? Stop the see-saw of imbalanced attention

As cyber threats continue to grow among companies with sensitive data, IT must take a holistic approach to managing and mitigating these threats. Here’s how to bridge preventative and restorative measures for IT resiliency.

guardians

Do you know who the new Guardians of the Galaxy are? It’s the morally upright CISOs

The digital consumer’s new best friend in large enterprises is the CISO – the custodians of the enterprise assets are now expanding their vision to include your and my data (at least the morally upright and forward-thinking ones)

3 legal law books

Insider threat legalese

Understanding your lawyer’s perspective on insider threats...and three suggestions to help start the conversation.

Computerworld - Scary Tech [Slide-03] - Facial recognition systems reporting to secret govt agencies

Protecting trade secrets: technology solutions you can use

The fourth and final part of a series on stopping trade secret theft in your organization.

enhancing ddos defenses with a web application firewall

Your cache is exposed

On February 28, Akamai recorded a 1.35 Tbps DDoS attack driven by a relatively new vector, memcached reflection. Memcached can have an amplification factor of roughly 500,000 times larger than the initial query, which allows small set...

security map digital encryption identity

From NSTIC to improved federal identity, credential and access management

OMB’s ICAM policy change leverages NIST’s Digital Identity Guidelines permitting the use of non-PIV, AAL 3 credentials for logical access, and tasks agencies to accept federated credentials for consumers conducting transactions online....

Black Hat 2015

The CSO guide to top security conferences

CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.

people search find locate

How to hire the right analysts for your intelligence program

As someone who’s been deeply involved in virtually every aspect of hiring and job-seeking in security and intelligence, I can attest firsthand that while the process is rarely easy, it’s worth the effort.

certified rubber stamp with red ink

Underwriting cyber exposure – the business case for certifying

The ability to have an independent and agnostic organization provide a certification of a product or service has more upside than down.

Load More