New EU General Data Protection Regulation (GDPR): An IT Security View – Part II

In the first part of “GDPR: An IT Security View”, we discussed some core objectives, characteristics, and principles of the GDPR, which is due to take effect on 25th May 2018. In this second article, we will discuss in greater depth some of the core IT security objectives relating to GDPR. The purpose of the GDPR is … Read More The post New EU General Data Protection Regulation (GDPR): An IT Security View – Part II appeared first on The State of Security.
Read more

Corporate Executives, Customers at Odds on Cybersecurity

Because companies accept and store sensitive, personally identifiable consumer customer data, they are responsible for safeguarding it against theft by cybercriminals. This should be common sense. Yet, according to a Ponemon Institute study commissioned by Centrify, only about half of the marketing and IT/security professionals polled agree that their companies “have an obligation to take..
Read more

The need for speed – Your data unleashed!

I have a fun question for you: Which of these is the faster of the two cars? Take your time, think about it from different perspectives. I’ll wait… And let me give you a hint—it’s a trick question, so double-check your assumptions. If you picked the T-Bucket hot rod on the left, you may be The post The need for speed – Your data unleashed! appeared first on Voltage.
Read more

Cyber Security and the Human Factor – An Opinion Piece

Born and bred in IT – and first influenced by global Oil & Gas, the Japanese and the German manufacturing industry – I never experienced excessive levels of management before entering the more anglophile international workspace outside my home country. At best, between me and the board were only two clear structured formal management levels. … Read More The post Cyber Security and the Human Factor – An Opinion Piece appeared first on The State of Security.
Read more

ExpertOps: More Security with Less Time

When you work for the office of your organization’s chief information security officer (CISO), time is not your friend. In 2015, the average time from compromise to discovery of a security incident was 146 days. That figure dropped to 99 days in 2016. Even so, the pressure is still on for organizations to do more … Read More The post ExpertOps: More Security with Less Time appeared first on The State of Security.
Read more

12 Top Talks from the 2017 Retail Cyber Intelligence Summit

On October 2-4, 2017, the Retail Cyber Intelligence Sharing Center (R-CISC) hosted Securing Retail 002, the second iteration of its annual summit first held in April 2016. Speakers from Microsoft, Target and other Fortune 500 companies shared their thoughts on the retail digital security landscape with attendees over the course of the two-day event. Presented … Read More The post 12 Top Talks from the 2017 Retail Cyber Intelligence Summit appeared first on The State of Security.
Read more

Make Security a Business Partner to Avoid Job Burnout

Take a high-pressure job, add in high-performance expectations, season with continual threats from hackers looking to steal your company’s electronic assets, and you have a sure-fire recipe for burnout. The list of things that keep chief information security officers awake at night—and some of them still in the office with their sleeves rolled up—are legion...
Read more

Cybersecurity vs Productivity: The CISO’s Dilemma

Today organizations are struggling with the best way to protect against attacks that are targeting the endpoint. Too often, the security strategy has been to put the onus on the individual employee. Research has shown, over and over again, that training and user restrictions are both tedious and expensive, and have a very low success The post Cybersecurity vs Productivity: The CISO’s Dilemma appeared first on Bromium.
Read more
Page 1 of 612345...Last »