Opinions

CSO Executive Sessions [podcast logo]
A mobile phone with virtual security framework overlay.

data explosion / data streams / volume / velocity

Bracing for the security data explosion

Organizations must prepare for collecting, processing, analyzing, and acting upon terabytes of security data.

three global network puzzle pieces

3 XDR market challenges

XDR is a promising concept, but XDR vendors face deployment challenges and competition on several fronts.

COVID-19 coronavirus pandemic data tracking

10 security changes post-COVID-19

CISOs must anticipate burgeoning needs for distributed security scale, intelligence, and self-service.

rotating square frames around a bridge path / future / change / transformation

Why frameworks are more necessary than ever for secure enterprise transformations

Taking governance shortcuts in order to quickly take advantage of competitive opportunity can lead to major failings when it comes to security and privacy and cause serious long-term damage to the business.

Conceptual art: Creative collaboration while physically distancing during the COVID-19 pandemic.

Why COVID-19 will change identity management forever

Large job losses, more people working from home, and an increased use of freelancers and consultants are forcing companies to rethink their access control models.

integration / exchange / unification / cohesion / unified blocks

10 things you should know about XDR

An initiative more than a technology, XDR seeks to simplify and unify security technologies to make the whole greater than the sum of its parts.

Cybersecurity lock with the abstract circuitry of a security fabric.

Securing IoT requires a shift to a security fabric

The IoT era and the expectation that everything will be connected, accelerates the need to move away from point products and toward the concept of a security fabric.

A man using a mobile phone in shadow against a bright wall

Amid the pandemic, using trust to fight shadow IT

With most workers scattered at home and trying to come up with their own ad-hoc IT workarounds, there’s an easy way for IT shops to build trust: communicate.

examining / analyzing / selecting / business data / statistics / analytics

4 tips for a successful cyber threat intelligence program

COVID-19 has opened the cyberattack floodgates; defenders need strong cyber threat intelligence (CTI) analysis, operationalization and sharing. Here's how to get more from your CTI program.

Abstract trend lines graphing change and transformation.

COVID-19 pandemic accelerates transformation in enterprise security

Organizations must retool their policies and invest in security programs to acclimate to a post-COVID-19 business landscape.

cso exectutive sessions 3000px x 3000px

Episode 8: Healthcare security in a time of crisis

Podcast Episode 8: Listen now as Gary Gooden, CISO at Seattle Children’s, joins host Bob Bragdon to discuss the impact of COVID-19 on security at the healthcare organization.

meeting6

Telecommuting in a post-COVID U.S. will be radically different. And that's a very good thing.

IT execs need to start talking with other C-levels now and figure out what they want their post-COVID company to look like.

CSO > breakthrough / penetration testing / hammer breaking binary glass

4 ways automated penetration testing tools can help mitigate COVID-19 related risks

New tools map attack surface, test security controls, and behave like cyber-adversaries.

cybersecurity  >  information security / data protection / lock / shield / layers of integration

Work from home, phase 2: What comes next for security?

Phase 1 was all about employee access, network communications confidentiality/integrity, and basic endpoint security. The next phases will move quickly from risk assessment to mitigation.

CSO Executive Sessions [podcast logo]

Episode 7: Security in a time of crisis

Podcast Episode 7: Listen now as Christopher Burgess, a writer and speaker on security issues and former senior security adviser to Cisco, discusses the risk from the scramble to move to remote work at scale.

Exiting the computing business

5 reasons security staff leave (and what to do about it)

Retaining skilled security staff is difficult in the best of times, but there are steps you can take that will make a difference.

COVID-19 coronavirus [morphology/visualization]

3 ways COVID-19 is changing CISO priorities

The scramble to enable remote workers changes security strategies, priorities, and workflows for 2020.

5G light trails

5G without governance is risky business

5G implementations that fail to include baking in the needed governance safeguards will be subject to cost overages, inefficiencies and erosion of customer trust. Can your business afford that risk?

Load More