Opinions

ip welcome to insider pro primary by Laurence Dutton getty
Three businessmen - see no evil, hear no evil, speak no evil. [Thinkstock]

easy simple pixel hand computer pointer

Attention cybersecurity entrepreneurs: CISOs want simplicity!

The cybersecurity market has matured from reactive to proactive cybersecurity technology integration. Top CISOs and industry experts weigh in on how new entrants into the cybersecurity marketplace can shape their value propositions to...

Blackout, New York City skyline

Combatting extreme weather and power outages, a growing need for AI

The past month saw an unprecedented leap in natural disasters across the U.S. In an effort to prevent the spread of wildfires in California, power was shut down for days as a proactive and preventative measure. With climate change,...

dumpster fire

What security companies – and all of us – can learn from the Deadspin debacle

The recent news of the exodus of the entire editorial staff of the popular sports and culture website Deadspin sent reverberations throughout the media. But two of the biggest lessons to be learned from Deadspin’s downfall should...

neon skull sign / danger / caution / threat

The 24/7 insider threat – Managing risk in a changing environment

A new model for managing insider risk in the "always-on” and “on-demand” workplace.

Job vacancy / security staffing problem  >  empty chair / abstract lock + circuit mechanisms

The security staffing problem isn't going away. Now what?

6 strategies and tactics to adjust to a future characterized by higher levels of both vacancy and turnover.

protected key within a secured network

4 big changes coming to cybersecurity in 2020 and beyond

The pace of technology and market changes will pick up in 2020, impacting security technologies, innovation, investment, and the industry at large.

CSO > cloud computing / backups / data center / server racks / data transfer

5 cloud security basics and best practices

Companies that move to the cloud have to assume new responsibilities, develop new skill sets and implement new processes. The first step to better cloud security is to assume you have no security.

Cloud security threats  >  Lightning strikes a digital landscape via binary clouds.

Rising complexity, higher stakes for enterprise risk management

As the pace of business and a shifting threat landscape challenge enterprises, optimizing risk has become a moving target.

rfp write a proposal document contract signature deal agreement paper by extreme media getty

4 key vendor contracting pitfalls

Unless these 4 pitfalls are avoided, a vendor can have the absolute best security documents in the industry and still present material risk to its customers.

EU / European Union / GDPR data privacy, regulation, compliance

Global Data Protection and the right to be forgotten

Will the United States ever get its own privacy law?

aerial view of a network of roads

Privacy legislation: The road ahead

The pace of change in privacy laws, and the technologies they seek to regulate, is only accelerating.

Cybersecurity awareness  >  A weary businessman holds hand to forehead at security training.

Cybersecurity Awareness Month: Increasing our self-awareness so we can improve security

With the increased prominence of cybersecurity in organizations due to many crippling cyberattacks, the emphasis is now on continual engagement, as it should be. It’s also important to address the tunnel vision that has plagued the...

Cybersecurity awareness  >  A man with a binary blindfold finds his way through question marks.

3 actions to take during cybersecurity awareness month

Based on recent research, improving cybersecurity awareness among business executives, CIOs, and, yes, infosec professionals should be a goal for any organization.

detection radar computer bug threats identify breach  by the lightwriter kao studio getty

Autonomy and the death of CVEs?

Is the manual process of reporting bugs holding back the advent of automated tools?

A binary mask.

Deepfakes and synthetic identity: More reasons to worry about identity theft

How can we maintain control over digital identity In a world where it is being blurred and abused by fraudsters?

Chains of binary data.

Regulatory landscape provides added incentive for enterprises to explore blockchain

Evolving security regulatory requirements should provide incentive for enterprises to explore what blockchain and other emerging technologies can do to strengthen their security programs.

keys / locks / security

Different conferences, common theme: How to best manage the disparate security solutions we’re using

We need to unite the different islands of security solutions in both the physical and cyber worlds to provide the best level of protection.

programming code development split screen display

Lessons learned through 15 years of SDL at work

In short? Security Development Lifecycle is all about the developers...

Load More