Opinions

virus detection

Quick Take-Aways From the RSA Security Conference

Good discussions and industry focus, too much hype, lots of work ahead


RSA conference 2017

RSA roundup: 5 security vendors CISOs need to be aware of

Here are five companies that security professionals should consider in their quest to keep their organizations secure.

The increasingly fast speed of business-computing-technology.

Moving to fast fail

Managing security for today’s enterprises is an increasingly complex task. But being comfortable with failure is an important skill.

Dana Deasy

The Top 3 cyber priorities for DOD’s incoming CIO

The DOD’s new top IT executive Dana Deasy will be an important cog in DOD’s big push toward universal defense cloud adoption, facilitating organizational changes that will make the military’s cyber defense more streamlined and...

4 shock stunned fear

Negative motivation is not positive engagement

The barrage of fearmongering and FOMO over social media and advertising leads to a vicious cycle of negative engagement that builds anger and frustration that can’t be addressed by buying new products. We can break the cycle through...

baby working on a laptop

The immature security industry

The security industry often tries to do everything instead of putting focus on a singular area where we can make a real difference. This is a sign of an immature industry.

healthcare security

Is your organization a HITRUST org?

For good reason, there's now more focus on regulatory compliance for healthcare—which also includes a multitude of vendors and business associates to manage risk for and meet or exceed the Health & Human Services (HHS) compliance...

cyber crime cybersecurity

Implementing the NIST cybersecurity framework could be worth at least $1.4m to your business

While there are many other frameworks available, the NIST CSF provides a nationally recognized guideline as you scale your business and cybersecurity program.

cyberwarfare defense illustration

Nation state attacks – the cyber cold war gets down to business

Cyber weaponry is moving to new frontiers: yours. Businesses are the next target on the nation state menu. Are you protected or vulnerable?

networking wan

Overcoming the security challenges of software defined networking

SD-WANs potentially offer many compelling benefits. However, the result is that organizations have less knowledge about the infrastructure that is being used.

Facebook Data Debacle - Android

Breaking down Facebook’s communications playbook

Lessons learned from Facebook’s response to its data privacy crisis, and how you can use them to protect your own reputation – even if you aren’t a tech giant.

security

Left-shifting enterprise appsec: what we can learn from mobile app developers

Multiple, concurrent innovations in enterprise application development present the opportunity to improve application security by “left-shifting” it to the beginning (and throughout) the dev cycle. Mobile app developers have to a...

children classroom laptops students thinkstockphotos 617577684

Technology must be part of solution for empowering rural women and girls

United Nations addresses challenges to create and expand economic opportunity for rural women and girls, but the world must commit to technology-driven solutions. And as we face increasing cyberthreats, shouldn’t women be part of the...

cloud security ts

Driving cybersecurity and digital transformation with cloud technologies

Enterprises – especially in regulated industries – need to demonstrate compliance with NIST, HIPAA and GDPR to address an increasing set of privacy and cybersecurity threats. Cloud computing platforms provided a ready-made solution,...

balance - measure - comparison - risk assessment

Want IT resiliency? Stop the see-saw of imbalanced attention

As cyber threats continue to grow among companies with sensitive data, IT must take a holistic approach to managing and mitigating these threats. Here’s how to bridge preventative and restorative measures for IT resiliency.

avast security pro for mac icon

Law enforcement uses anti-virus software to recover suspect's web history

Let’s mainstream the idea that privacy is almost impossible in the face of digital forensics. Avast AV leaving behind a private browsing database, is a shocking illustration of this.

guardians

Do you know who the new Guardians of the Galaxy are? It’s the morally upright CISOs

The digital consumer’s new best friend in large enterprises is the CISO – the custodians of the enterprise assets are now expanding their vision to include your and my data (at least the morally upright and forward-thinking ones)

3 legal law books

Insider threat legalese

Understanding your lawyer’s perspective on insider threats...and three suggestions to help start the conversation.

Computerworld - Scary Tech [Slide-03] - Facial recognition systems reporting to secret govt agencies

Protecting trade secrets: technology solutions you can use

The fourth and final part of a series on stopping trade secret theft in your organization.

Load More