Based on the results of an independent survey of IT and IT security
practitioners, this second annual report looks at the latest trends in
security operations centers (SOC), both positive and negative. Here
presents an unvarnished view of the current state of SOC performance and
effectiveness based on responses...
The shortage of trained cybersecurity workers has substantially declined this year as many more individuals entered the field, says Clar Rosso, CEO of (ISC)², the U.S.-based nonprofit association that offers training to cybersecurity professionals.
The attack surface is expanding and adversaries are more sophisticated. Complexity is mounting and the pace is relentless.
As a security leader, it can be hard to know where to focus first.
Yet in the midst of this threat landscape overload, one challenge presents a greater risk than any other. And more often...
This webinar with Osterman Research offers insights into critical issues network managers need to address to gain visibility and secure their network traffic.
Network Detection and Response (NDR) solutions provide the necessary visibility not available in SIEM or EDR solutions. Watch this webinar to complete your security architecture.
Encryption keeps the internet secure, but it also gives bad actors the perfect hiding place. Join Gigamon and ISC2 for a deep dive into the latest encryption protocol, TLS 1.3, to learn what's different and what advantages it offers in the constant effort to stay one step ahead of threats.
Information Security Media Group's members-only CyberEdBoard CISO community has opened its doors, giving senior cybersecurity practitioners a private ecosystem to exchange intelligence, gain access to critical resources and enhance personal career capabilities in collaboration with peers around the world.
The distributed workforce, combined with the need to modernize and improve operational efficiency, has reframed digital transformation priorities and introduced new areas of risk to today's enterprise. In light of ongoing macroeconomic demands, the CISO is facing increasing pressure to deliver value.
If...
Yes, a CISO must be technologist and a business risk leader. But more than ever, a CISO also must be a bit of a counselor, says Mark Eggleston, chief information security and privacy officer of Health Partners Plans, who puts mental health support atop his own list of key responsibilities.
As CISO of the Federal Reserve Bank of Philadelphia, Nancy Hunter has a defined role and priorities. But she also has a refined sense of responsibility for collaboration, mentoring and creating new career opportunities for women.
How will the future workplace look, and what are the best-practice models for securing it? Why is continuing to rely on traditional approaches courting disaster? What are the steps you must take to implementing Zero Trust across your ecosystem? What are the top trends in Identity Management and how can your...
The world of third-party risk management is rapidly changing. Each day, organizations like yours face new security, privacy, and compliance threats when working with third parties. The good news is there are world-class teams around the world that are paving the way with new best practices for the next generation of...
While nearly three-quarters of cybersecurity professionals would grade their organization's
ability to identify and mitigate a cyberattack, as above average or superior, nearly half have
been subject to a spear-phishing attack and a third have suffered a malware incident in the
last year. Further, over half of...
Business email compromise (BEC) and email account compromise (EAC) are complex problems that require multi-layered defenses. Cyber attackers have countless ways of tricking your users, preying on their trust and exploiting their access to key data, systems and resources.
To succeed, attackers need to find just...
Increasing stress levels for cybersecurity professionals pose a serious organizational security risk, says Neal O'Farrell, founder of the PsyberResilience Project, a mental health advocacy group.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.