Budgets
SecurityWeek Names Ryan Naraine as Editor-at-Large
January 18, 2021 Added by:InfosecIsland News
SecurityWeek has named Ryan Naraine as Editor-at-Large, adding a veteran cybersecurity journalist and podcaster to its editorial team.
Comments (0)
Edge Computing Set to Push Security to the Brink
June 13, 2020 Added by:Steve Durbin
In the coming years, poor implementation of edge computing solutions will leave organizations open to attack.
Comments (0)
Securing the Internet of Things (IoT) in Today's Connected Society
November 19, 2019 Added by:Steve Durbin
The rush to adoption has highlighted serious deficiencies in both the security design of Internet of Things (IoT) devices and their implementation.
Comments (0)
Human-Centered Security: What It Means for Your Organization
September 24, 2019 Added by:Steve Durbin
Human-centred security acknowledges that employees interact with technology, controls and data across a series of touchpoints throughout any given day.
Comments (0)
Three Strategies to Avoid Becoming the Next Capital One
August 30, 2019 Added by:George Gerchow
Three strategies to preventing catastrophic cloud security issues.
Comments (0)
Why a Business-Focused Approach to Security Assurance Should Be an Ongoing Investment
August 29, 2019 Added by:Steve Durbin
Security assurance should provide relevant stakeholders with a clear, objective picture of the effectiveness of information security controls.
Comments (0)
New Year’s Resolution for 2019: Cybersecurity Must Be the Top Priority for the Board
January 04, 2019 Added by:Steve Durbin
Four security topics businesses should focus on in 2019.
Comments (0)
Securing the BYoD Workplace
November 28, 2018 Added by:Scott Gordon
A secure organization rises to meet the challenges posed by BYoD instead of letting them fly overhead.
Comments (0)
A Human-Centered Approach to Building a Smart, Satisfied Information Security Team
November 15, 2018 Added by:Steve Durbin
Building tomorrow’s security workforce is essential to address shortfalls in skills and capabilities and to deliver robust and long-term security for organizations in the digital age.
Comments (0)
Lessons from Cyber Essentials – Going Back to the Basics
October 11, 2018 Added by:Andrew Avanessian
IT leaders across all organisations should be working to weave in the Cyber Essentials scheme into the fabric of their businesses.
Comments (0)
Could a Credit-Like Security Score Save the Cyber Insurance Industry?
October 11, 2018 Added by:Joseph Kucic
Enterprises need access to cyber insurance that accurately reflects their current security posture and that covers both direct and indirect expenses.
Comments (0)
The Importance and Requirements of Privileged Access Management
August 30, 2018 Added by:Joseph Carson
The growing need to secure the “keys to the kingdom” and the steps organizations need to take to protect their critical credentials.
Comments (0)
Criminal Cyberattacks Are Up. Can Automated Security Help Bring Them Down?
July 26, 2018 Added by:James Lee
Companies that still rely on manual processes – security tools that require frequent tuning or manual CVE patching, for example – fare worse if they are breached.
Comments (0)
Science Fiction Come True: Weaponized Technology Threatens to Shatter Security, Critical Systems
July 03, 2018 Added by:Steve Durbin
In the face of mounting global threats, organization must make methodical and extensive commitments to ensure that practical plans are in place to adapt to major changes in the near future.
Comments (0)
The 3 Must Knows of Sandboxing
June 04, 2018 Added by:Boris Vaynberg
While sandboxes do provide a layer of prevention in a cyber threat prevention strategy, they come with a tax that may be too high for most organizations to pay.
Comments (0)
Global Security Threats You Need to Know About in 2018
January 03, 2018 Added by:Steve Durbin
In the year ahead, businesses of all sizes must prepare for the unknown so they have the flexibility to withstand unexpected and high impact security events.
Comments (0)
- SecurityWeek Names Ryan Naraine as Editor-at-Large
- Why Cyber Security Should Be at the Top of Your Christmas List
- United States Federal Government’s Shift to Identity-Centric Security
- How Extreme Weather Will Create Chaos on Infrastructure
- BSIMM11 Observes the Cutting Edge of Software Security Initiatives
- Sustaining Video Collaboration Through End-to-End Encryption
- Will Robo-Helpers Help Themselves to Your Data?
- Securing the Hybrid Workforce Begins with Three Crucial Steps
- A New Strategy for DDoS Protection: Log Analysis on Steroids
- COVID-19 Aside, Data Protection Regulations March Ahead: What To Consider