Blockchain as an IoT Security Mechanism

|
Building more robust security for the growing Internet of Things (IoT) has been a focal point for many over the past few years. Might blockchain, the distributed ledger technology for overseeing transactions across a network over time, be an ideal solution? ... Read More

IT Auditors in the Spotlight

|
IT auditors—the people who conduct examinations of the management controls within an organization’s IT infrastructure to determine if technology assets are secure and to ensure data integrity—have had their hands full lately ... Read More

Smaller Companies Need to Step Up Their Cyber Security Efforts

|
Whenever we hear about major cyber security attacks such as data breaches, it’s typically larger enterprises that are the victims. That makes sense, considering those events can potentially impact a lot of people and therefore are more likely to grab headlines and garner attention ... Read More

Managing Risk in the Extended Enterprise

|
The whole concept of “enterprise” has changed dramatically in recent years. With ever-growing ecosystems of connected partners, suppliers, customers, and other third parties, companies have opened up new opportunities for business growth ... Read More

Study Shows Many Organizations Need to Improve Their Efforts to Comply with Data Privacy Laws

|
Implementation of the California Consumer Privacy Act of 2018 (CCPA) is fast approaching, and based on a recent report the news is not great as far as organizations’ progress in complying with the new rules as well as other data privacy regulations ... Read More

CFOs Getting More Involved in Cyber Security Strategies

|
CISOs, CSOs, and CIOs are not the only C-level executives with a deep concern about cyber security. New research shows that CFOs appear to be taking a more active role in ensuring that their organizations are protected against data breaches, hacks, malware, and other threats ... Read More

Throwing More Money at Cyber Security Challenges Will Not Necessarily Address Them—Companies Need to Spend Wisely

|
Here’s a disturbing bit of information: a large number of IT security leaders and teams don’t know if cyber security tools are working as they should, despite organizations investing millions of dollars in such technology each year ... Read More

Companies Place Cyber Security in the Spotlight

|
New research shows that cyber security is taking center stage at many organizations. A pessimistic way of looking at this would be to acknowledge that things have gotten so bad with breaches, malware, and other incidents that enterprises have no choice but to focus on security ... Read More

Shades of GDPR: Are You Ready for California’s New Privacy Law?

|
The implementation of the California Consumer Privacy Act of 2018 (CCPA) is just around the corner, but there are indications that many organizations might not be ready for the new data protection requirements ... Read More

Top Inherent Risks with Cloud Security

|
The Cloud Security Alliance (CSA), an organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, recently unveiled its “Top Threats to Cloud Computing: The Egregious Eleven,” a report that examines the risks inherent with cloud security ... Read More