Opinions
Why 2021 will be a big year for deception technology
New use cases, MITRE Shield support, and greater awareness will drive market growth and penetration.
Why you should consider outsourcing DLP
Data loss due to insider threats is a growing problem, but many companies don't have the resources to support an in-house data loss prevention system. Outsourcing might be the answer.
Protecting the supply chain in an era of disruptions
Supply chain problems encountered during the COVID-19 pandemic brought continuity planning out of the shadows and into the boardroom.
Beyond the firewall: Intrusion Detection Systems
Firewalls are so 2000s. With your "office" now scattered over homes everywhere, you need a new way of protecting your office from network threats and that's IDSs.
What is the dark web? How to access it and what you'll find
The dark web is part of the internet that isn't visible to search engines and requires the use of an anonymizing browser called Tor to be accessed.
5 open source intrusion detection systems for SMBs
If you don’t have a lot of budget at your disposal, these open-source intrusion detection tools are worth a look.
Developing a multicloud security strategy
Multicloud environments can work to organizations’ advantage, so long as there is an overarching strategy in place for cloud security.
Using open source for identity projects: 8 considerations
Consider these eight points to decide whether you can securely use open-source code in your identity management projects.
Is Cybersecurity Awareness Month worth it?
Cybersecurity awareness month has never gained traction beyond academia and the public sector. It’s time for all parties to commit or quit.
Podcast CSO Executive Sessions
Episode 14: How COVID-19 changed security priorities at Bristol Myers Squibb
Jerry Roberts, director of corporate security at Bristol Myers Squibb, joins host Bob Bragdon for a wide-ranging discussion on COVID-19's impact on security, the greatest cybersecurity challenges today, and how Roberts's 20-year...
Why CISOs must be students of the business
Technical expertise will only get you so far. To earn a seat at the executive table, today's CISOs need to understand their business.
Podcast CSO Executive Sessions
Episode 13: Serving up a risk management culture at McDonald's
Podcast Episode 13: Tim Youngblood, corporate vice president and CISO of McDonald's, joins host Bob Bragdon to discuss how he approaches risk management and how the pandemic changed the security landscape.
Podcast CSO Executive Sessions
Episode 12: Building board relationships
Podcast Episode 12: Mark Weatherford, chief strategy officer at the National Cyber Security Center, joins host Bob Bragdon to talk about building board relationships and why the single most important thing a CSO can do is inspire...
Five ways to keep working from home safe for your employees and your company
For many of us, we're not going back to working from the office anytime soon, so it's time to give serious thought about securing our home offices.
You're going to be using confidential computing sooner rather than later
These days it's not enough to secure your data when it's on your disk or moving across your network, you need to lock it down in memory as well.
5 persistent challenges security pros face
Highlights from the fourth annual “Life and Times of Cybersecurity Professionals” report
New US digital identity legislation promises more secure verification
COVID-19 has exposed the US’s lack of a comprehensive digital identity strategy. If passed, the Improving Digital Identity Act of 2020 will address this need through engagement among federal, state and local governments.
Addressing diversity in security
Turning good intentions into action requires a collaborative approach across the public sector, private sector, and non-profit industry associations.
Why it's time to shift to extended validation certificates
More than ever, a strong organizational identity is essential for building trust with users.
7 things to consider when choosing managed detection and response
Many organizations lack the internal expertise to address threat detection and response effectively; MDR can fill the gap. Here’s what to look for when you shop for MDR services.
-
Video/Webcast
Sponsored -
Analyst Report
Sponsored -
White Paper
-
Analyst Report
Sponsored -
eBook
Sponsored
BrandPosts
Learn more-
Sponsored by Sophos
-
Sponsored by CIS
-
Sponsored by Fortinet