Opinions

Fraud / deception / social engineering  >  A wolf in sheep's clothing in a binary environment.

Why 2021 will be a big year for deception technology

New use cases, MITRE Shield support, and greater awareness will drive market growth and penetration.

Insider threats  >  Employees suspiciously peering over cubicle walls

Why you should consider outsourcing DLP

Data loss due to insider threats is a growing problem, but many companies don't have the resources to support an in-house data loss prevention system. Outsourcing might be the answer.

supply chain management logistics - ERP - Enterprise Resource Planning

Protecting the supply chain in an era of disruptions

Supply chain problems encountered during the COVID-19 pandemic brought continuity planning out of the shadows and into the boardroom.

radar grid overlays the pupil of an eye / intrusion detection / scanning / threat assessment

Beyond the firewall: Intrusion Detection Systems

Firewalls are so 2000s. With your "office" now scattered over homes everywhere, you need a new way of protecting your office from network threats and that's IDSs.

Dark net warning sign against black and yellow warning stripes in the background.

What is the dark web? How to access it and what you'll find

The dark web is part of the internet that isn't visible to search engines and requires the use of an anonymizing browser called Tor to be accessed.

radar grid / computer circuits / intrusion detection / scanning

5 open source intrusion detection systems for SMBs

If you don’t have a lot of budget at your disposal, these open-source intrusion detection tools are worth a look.

cloud security ts

Developing a multicloud security strategy

Multicloud environments can work to organizations’ advantage, so long as there is an overarching strategy in place for cloud security.

open source box open box out of the box empty

Using open source for identity projects: 8 considerations

Consider these eight points to decide whether you can securely use open-source code in your identity management projects.

Multiple-exposure shot of a clock and calendar pages. [time / past / future / history / what's next]

Is Cybersecurity Awareness Month worth it?

Cybersecurity awareness month has never gained traction beyond academia and the public sector. It’s time for all parties to commit or quit.

CSO Executive Sessions [podcast logo]

Episode 14: How COVID-19 changed security priorities at Bristol Myers Squibb

Jerry Roberts, director of corporate security at Bristol Myers Squibb, joins host Bob Bragdon for a wide-ranging discussion on COVID-19's impact on security, the greatest cybersecurity challenges today, and how Roberts's 20-year...

Conceptual image of executives; silhouettes in motion with a virtual global network overlay.

Why CISOs must be students of the business

Technical expertise will only get you so far. To earn a seat at the executive table, today's CISOs need to understand their business.

CSO Executive Sessions [podcast logo]

Episode 13: Serving up a risk management culture at McDonald's

Podcast Episode 13: Tim Youngblood, corporate vice president and CISO of McDonald's, joins host Bob Bragdon to discuss how he approaches risk management and how the pandemic changed the security landscape.

CSO Executive Sessions [podcast logo]

Episode 12: Building board relationships

Podcast Episode 12: Mark Weatherford, chief strategy officer at the National Cyber Security Center, joins host Bob Bragdon to talk about building board relationships and why the single most important thing a CSO can do is inspire...

A computer with an abstract security system overlay.

Five ways to keep working from home safe for your employees and your company

For many of us, we're not going back to working from the office anytime soon, so it's time to give serious thought about securing our home offices.

A heavy vault-like door / security mechanism secures a laptop amid glowing blue circuits.

You're going to be using confidential computing sooner rather than later

These days it's not enough to secure your data when it's on your disk or moving across your network, you need to lock it down in memory as well.

executive pushing boulder uphill deadline stress struggle

5 persistent challenges security pros face

Highlights from the fourth annual “Life and Times of Cybersecurity Professionals” report

One avatar is uniquely identified among others at the center of a bullseye in a digital environment.

New US digital identity legislation promises more secure verification

COVID-19 has exposed the US’s lack of a comprehensive digital identity strategy. If passed, the Improving Digital Identity Act of 2020 will address this need through engagement among federal, state and local governments.

woman leader strong collaboration multi cultural diversity

Addressing diversity in security

Turning good intentions into action requires a collaborative approach across the public sector, private sector, and non-profit industry associations.

A virtual checkmark in digital system / standards / quality control / certification / certificates

Why it's time to shift to extended validation certificates

More than ever, a strong organizational identity is essential for building trust with users.

radar grid / computer circuits / intrusion detection / scanning

7 things to consider when choosing managed detection and response

Many organizations lack the internal expertise to address threat detection and response effectively; MDR can fill the gap. Here’s what to look for when you shop for MDR services.

Load More