Opinions

vulnerable breach hacked indecision

How to approach business leaders about cybersecurity when they don’t follow the breach headlines

Hint: hit them where it hurts the most – their own personal reputation and livelihood.

13 ssl

TLS/SSL security for websites

What if I told you that the TLS/SSL protocols can provide impenetrable protection for your company’s website? While completely untrue (nothing is impenetrable),TLS/SSL can provide strong data privacy, dependable data integrity and...

little girl sunglasses bright future predictions big data

What cybersecurity surprises does 2018 hold?

One thing's for sure: securing ourselves and our organizations will only get more difficult this year.

cloud security ts

How machine learning is shaping the next generation of cloud security

Security solutions must pivot in order to protect organizations as they move to the cloud.

umbrella businessman protection stormy dark insurance

Is compliance the best insurance for managing cybersecurity risk in 2018?

Cybersecurity challenges and risks continue to emerge as top threats to business as usual for large and small organizations alike. The ability to meet these threats requires understanding emerging standards. Compliance with these new...

smart city pins iot navigation

Data as a smart superstructure: a warning to the wise

Only by having a robust data governance stance can we hope to, not only protect our individual critical infrastructure sectors but the city and its citizens.

vulnerable gdpr breach security cyber attack

CISOs: What you can control – and what you can’t – in GDPR

80% of GDPR is out of the CISO’s control...

7 response

Data breach fatigue requires better response planning

Customers may view data breaches as common, but companies have to nail the response, or risk a consumer backlash.

cloud computing shared public cloud

Are shared services the answer to data protection?

There are still some issues to be addressed before everyone will be fully on board with the idea of shared services in government. But because the government is increasingly moving to the cloud, the sooner everyone is on board, the...

protection privacy locks security cybersecurity

Endpoint security suites must have these features

Endpoint security vendors must be a one-stop endpoint security shop -- providing such things as anti-malware, anti-exploit, EDR and hybrid deployment options -- if they want to compete.

man looking at exit quit termination

How to ensure that giving notice doesn’t mean losing data

The employee exit process often devolves into a fire-drill for IT teams. Having a documented process and a strong relationship with HR can help your team go from reactive to proactive.

keys to access solutions rubic cube puzzle

Role-based access control is fine – who needs attribute-based access control?

The benefits in business agility and security confidence that come from role-based access control are more than worth the effort of deployment.

computer forensics

4 reasons forensics will remain a pillar of cybersecurity

When protection fails, forensics can still prevail.

equations on chalkboard 87173350

Rewriting the security equation in 2018

Understanding the future impact of changes to the security landscape.

8 code driven security

Model-driven security: using unconventional controls to stay ahead of threats

We need to get out of our own way in terms of how we think about and implement security, while enlisting analytics and data science as our allies.

cybersecurity boards

Hacking security awareness: the program-changing magic of the advisory board

Most successful company programs have a few common traits, one of them being an advisory board. Advisory boards can propel security awareness programs into uncharted levels of success, yet most programs today don't utilize this simple...

hearts

7 ways to stay safe online on Valentine’s Day

Looking for love in all the wrong places? Here are some helpful tips for safeguarding yourself while trying to find love on the internet.

hacker endpoint security vulnerability cyberattack lock

How to approach a Zero Trust security model for your enterprise

Implementing a Zero Trust model to protect your enterprise's critical systems could be worth the trouble.

businessmen with umbrellas risk protected storm

How do I BRI?

Regardless of the threats, risks and security challenges a business may face, it’s crucial to recognize that having the right approach to intelligence has truly become a requirement.

vulnerable security breach innocent attacked

The global ungoverned area

Looking at the Internet through Westphalian-tinted glasses is not going to make us safer or more secure.

Load More