Policy

Ffc4103a877b409fd8d6da8f854f617e

SecurityWeek Names Ryan Naraine as Editor-at-Large

January 18, 2021 Added by:InfosecIsland News

SecurityWeek has named Ryan Naraine as Editor-at-Large, adding a veteran cybersecurity journalist and podcaster to its editorial team.

Comments  (0)

591f195449c4d535c681a49fdf35ace0

United States Federal Government’s Shift to Identity-Centric Security

December 17, 2020 Added by:Frank Briguglio

Governments are increasingly facing new legislation, standards, frameworks, and policies to protect critical and sensitive information.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

How Extreme Weather Will Create Chaos on Infrastructure

October 21, 2020 Added by:Steve Durbin

Extreme weather events will soon become more frequent and widespread, devastating areas of the world that typically don’t experience them and amplifying the destruction in areas that do.

Comments  (0)

671084740e306472f992b176b92ad051

COVID-19 Aside, Data Protection Regulations March Ahead: What To Consider

August 26, 2020 Added by:Terry Ray

Despite the COVID-19 pandemic, companies are obligated to comply with many laws governing data security and privacy

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Expect Behavioral Analytics to Trigger a Consumer Backlash

August 10, 2020 Added by:Steve Durbin

The deployment of cameras, sensors and applications in public and private places for behavioral analytics will be followed by consumer and regulatory backlash.

Comments  (0)

259aa33b32fc31717e8a18f2dc9edc19

Ending the Cloud Security Blame Game

July 08, 2020 Added by:Avishai Wool

Security is primarily your responsibility – with help from the cloud provider.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Edge Computing Set to Push Security to the Brink

June 13, 2020 Added by:Steve Durbin

In the coming years, poor implementation of edge computing solutions will leave organizations open to attack.

Comments  (0)

F3bd25e6f3b8f01dc21a92182761fb8a

Benchmarking the State of the CISO in 2020

March 27, 2020 Added by:Marc Wilczek

A run-down of Cisco's 2020 CISO Benchmark Report.

Comments  (0)

7e5878d1746c69c0ac1f9b86dfcc5ed9

When Data Is Currency, Who’s Responsible for Its Security?

February 11, 2020 Added by:Jason Bevis

With recent security incidents, we've caught a glimpse of the role that data enrichment, aggregators and brokers play in security. What type of responsibility do these parties bear in protecting consumer data and privacy?

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Global Security Threats Organizations Must Prepare for in 2020

January 08, 2020 Added by:Steve Durbin

To take advantage of emerging trends in both technology and cyberspace, businesses need to manage risks in ways beyond those traditionally handled by the information security function.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Human-Centered Security: What It Means for Your Organization

September 24, 2019 Added by:Steve Durbin

Human-centred security acknowledges that employees interact with technology, controls and data across a series of touchpoints throughout any given day.

Comments  (0)

239132446c9379ed143375ff11db6a65

Three Strategies to Avoid Becoming the Next Capital One

August 30, 2019 Added by:George Gerchow

Three strategies to preventing catastrophic cloud security issues.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Why a Business-Focused Approach to Security Assurance Should Be an Ongoing Investment

August 29, 2019 Added by:Steve Durbin

Security assurance should provide relevant stakeholders with a clear, objective picture of the effectiveness of information security controls.

Comments  (0)

5864aed0a807a1e29050f9221c6cfa67

Spring Cleaning: Why Companies Must Spring Clean Out Their Social Media Accounts This Season

June 14, 2019 Added by:David Stuart

Tips for cleaning and securing your online data this spring.

Comments  (0)

14a18daeba459ca50c5e7bcdde3a5fa0

The Promise and Perils of Artificial Intelligence

June 14, 2019 Added by:Boris Cipot

AI will help us to improve our lives. We, in turn, must ensure that the software doing so is secure.

Comments  (0)

D63b67548a5fd4323d25d572dd43bd76

Trump Administration Starts the Ball Rolling with the National Cyber Strategy

February 19, 2019 Added by:Sam Bocetta

The topic of cybersecurity won’t go away. Like national security in general, it will remain eternal fodder for future politicians to bat around

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »