Search results: CISO

CISO Stories Podcast: Practical Considerations for Managing Your MSSP

CISO Stories Podcast: Practical Considerations for Managing Your MSSP

For many organizations, large and small, it would be impractical to “skill up” to manage all aspects of cybersecurity. Managed Security Service Providers (MSSPs) provide many different services ...
CISO Stories Podcast: Achieving Security Buy-In - Change Approach Not Culture

CISO Stories Podcast: Achieving Security Buy-In – Change Approach Not Culture

We need the organization to support the cybersecurity initiatives and thus we try to influence the organization to support these goals for the protection of the organizational assets. If we are failing, ...
CISO Stories Podcast: Hacking Your Way Into Cybersecurity

CISO Stories Podcast: Hacking Your Way Into Cybersecurity

Kerissa Varma is Group Chief Information Security Officer of Old Mutual Limited, one of the largest financial services organizations on the African continent. Kerissa joins the show to discuss the cybersecurity skills ...
CISO Stories Podcast: Managing the Security Product Salesperson

CISO Stories Podcast: Managing the Security Product Salesperson

CISOs are approached frequently by salespersons seeking to sell products that are supposed to reduce risk. How should a CISO manage these relationships? Kevin Morrison, CISO at Alaska Air Group, joins the ...
DigitalHealthEcosystems-Blog-v1.jpg

Healthcare Digital Ecosystems Hinge on Modern Identity

|
Healthcare is no longer confined to the doctor’s office, clinic, or hospital. Today, networks of health technologies power connected digital ecosystems that have transformed care. These ecosystems have been growing and evolving ...

Winning the cyber war with Collective Defense

A few years ago when I witnessed my 16 grandchildren scattered throughout the house playing the game Fortnite, I realized something: Even if they had been playing from their respective homes, they ...
CIEM, Cloud infrastructure entitlement management, and identity management for beginners

CIEM & Identity Management For Beginners

The public cloud eliminated traditional network boundaries, so cloud security is based on different strategies, like entitlement management. The security […] The post CIEM & Identity Management For Beginners appeared first on ...
ESG Research Report: 2021 Trends in Endpoint Security

ESG Research Report: 2021 Trends in Endpoint Security

As security threats quickly continue to evolve, our approaches to security must evolve as well. Simple signature-based antivirus solutions are no longer enough to prevent the highly targeted attacks of today, making ...
Approval Workflows and Notifications for Busy People

Approval Workflows and Notifications for Busy People

Maybe it’s happened to you. You deleted a service account because it didn’t seem like any processes were tied to it. And then something broke. Privilege management mistakes happen—but they don’t have ...
Evolving Ransomware Tactics Include Recruiting Insiders and DDoS Attacks

Evolving Ransomware Tactics Include Recruiting Insiders and DDoS Attacks

The attention generated by the DarkSide ransomware attack against Colonial Pipeline in May has helped to reshape the ransomware threat landscape. One of the most important modifications came when the digital crime ...

Secure Guardrails