Growing Threat of Destructive Attacks is One of the Top Cyber Risks Organizations Face

|
At a time of technological transformation and “cyber everywhere”, the attack surface for organizations is exponentially growing and cyber criminals are going after operational systems and backup capabilities simultaneously in highly sophisticated ways—leading to enterprise-wide destructive cyber attacks ... Read More

Securing the Work-At-Home Environment

|
The new business realities created by the coronavirus pandemic include unprecedented numbers of people working from home or from other remote locations ... Read More

How Effective are Security Operations Centers?

|
A lot of organizations rely heavily on their security operations centers (SOCs) to maintain a strong cyber security posture. But just how effective are these centralized units that are designed to deal with security issues on an organizational level? ... Read More

Blockchain as an IoT Security Mechanism

|
Building more robust security for the growing Internet of Things (IoT) has been a focal point for many over the past few years. Might blockchain, the distributed ledger technology for overseeing transactions across a network over time, be an ideal solution? ... Read More

IT Auditors in the Spotlight

|
IT auditors—the people who conduct examinations of the management controls within an organization’s IT infrastructure to determine if technology assets are secure and to ensure data integrity—have had their hands full lately ... Read More

Smaller Companies Need to Step Up Their Cyber Security Efforts

|
Whenever we hear about major cyber security attacks such as data breaches, it’s typically larger enterprises that are the victims. That makes sense, considering those events can potentially impact a lot of people and therefore are more likely to grab headlines and garner attention ... Read More

Managing Risk in the Extended Enterprise

|
The whole concept of “enterprise” has changed dramatically in recent years. With ever-growing ecosystems of connected partners, suppliers, customers, and other third parties, companies have opened up new opportunities for business growth ... Read More

Study Shows Many Organizations Need to Improve Their Efforts to Comply with Data Privacy Laws

|
Implementation of the California Consumer Privacy Act of 2018 (CCPA) is fast approaching, and based on a recent report the news is not great as far as organizations’ progress in complying with the new rules as well as other data privacy regulations ... Read More

CFOs Getting More Involved in Cyber Security Strategies

|
CISOs, CSOs, and CIOs are not the only C-level executives with a deep concern about cyber security. New research shows that CFOs appear to be taking a more active role in ensuring that their organizations are protected against data breaches, hacks, malware, and other threats ... Read More

Throwing More Money at Cyber Security Challenges Will Not Necessarily Address Them—Companies Need to Spend Wisely

|
Here’s a disturbing bit of information: a large number of IT security leaders and teams don’t know if cyber security tools are working as they should, despite organizations investing millions of dollars in such technology each year ... Read More