Building a threat intelligence team from the ground up can be riddled with political inertia. This whitepaper details how to merge operational and strategic capabilities to automate and analyze external attack data to identify current and future security threats.
Discover the six core competencies that comprise a...
From top to bottom, today's CISO needs a wide-ranging set of skills to be successful in defending their organization against hackers in the current threat landscape. From leading board-level initiatives to understanding how data and money flow through each department, a CISO has to have a strong foundation in both...
To facilitate faster decision-making, better cost control and increased transparency, many organizations now task a single executive to oversee all security, privacy and risk functions, says ADP's Roland Cloutier.
Today's organization needs to provide its employees, partners, applications and even networks access to its data and IT environment regardless of how they access it. But challenges regarding identity management and device compliance can make it very difficult to be secure in this increasingly complex IT world -...
A new survey shows 82 percent of organizations around the world are struggling with a shortage of staff with cybersecurity skills. Training expert Simone Petrella analyzes the survey results and spotlights the skills needed now to fight emerging cyber threats.
CISOs face the continuing challenge of how to clearly communicate information security risk to the board and senior management. But now they can take advantage of a free metrics framework designed to help evaluate an organization's cybersecurity readiness. Phil Cracknell of ClubCISO describes the effort.
CISOs must be empowered to define the security architecture for smart cities. How? By securing endpoints of known and unknown device categories in the network, says David Dufour, head of security architecture for smart cities at Webroot.
A new report from Forrester Research says most security strategies do not align with overall business goals, and are in danger of losing credibility. Don't fall into this trap of irrelevance. Download the report and learn 6 steps your business can take today to build a more relevant security strategy that aligns with...
Technology is a key component of any security strategy, but even the best tech will not prevent a data breach. A new report from Forrester Research advises building a risk management framework that that keeps organizations secure, while also building and retaining customer trust.
Download the report today and...
The increase in breaches is having a positive impact on IT security employment, as headlines about one cybersecurity incident after another serve as recruiting tools for skilled cyber defense workers. The IT and IT security workforce reached record levels this past quarter.
A spate of high-profile, high-impact cyber breaches at several of the largest financial institutions in the United States has brought attention to a point that cybersecurity professionals have long taken as an article of faith: boards of directors need to take an active role in the management of cyber risk.
Yet,...
As stated in a recent issue of the FDIC's Supervisory Insights, the risks presented by cyber attacks have become "one of the most critical challenges [in the last decade] facing the financial services sector due to the frequency and increasing sophistication of cyber attacks." In just a year's time, 2014 to 2015,...
Regardless of how many security controls are placed on a network and the components that are involved in making a network operate, there will always be vulnerabilities in a connected world. So, what do you do in an environment that allows for such risk of compromise?
One of the best methods of protecting...
As many as 250,000 credentials for Remote Desktop Protocol servers around the world may have been offered for sale on the now-shuttered xDedic cybercrime marketplace. So what can organizations do to mitigate related risks and avoid a major network intrusion?
CISOs are facing some of the biggest challenges,
regardless of company size, with
fast-changing technologies such as cloud
and security risk growing at an exponential
rate.
Download this interview with Qualys CEO Philippe Courtot to gain his insight on:
The biggest challenges facing CISOs today
Advice for...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.