ExpertOps: More Security with Less Time

When you work for the office of your organization’s chief information security officer (CISO), time is not your friend. In 2015, the average time from compromise to discovery of a security incident was 146 days. That figure dropped to 99 days in 2016. Even so, the pressure is still on for organizations to do more … Read More The post ExpertOps: More Security with Less Time appeared first on The State of Security.
Read more

12 Top Talks from the 2017 Retail Cyber Intelligence Summit

On October 2-4, 2017, the Retail Cyber Intelligence Sharing Center (R-CISC) hosted Securing Retail 002, the second iteration of its annual summit first held in April 2016. Speakers from Microsoft, Target and other Fortune 500 companies shared their thoughts on the retail digital security landscape with attendees over the course of the two-day event. Presented … Read More The post 12 Top Talks from the 2017 Retail Cyber Intelligence Summit appeared first on The State of Security.
Read more

Security Is a Team Sport

If you’ve read a security blog anytime in the last year, you haven’t escaped mention of the dreaded skills gap for cybersecurity professionals. There seems to be consensus that it’s getting harder to hire skilled security staff, though the reason for that is up for debate – some say we’re just going about it the wrong way, … Read More The post Security Is a Team Sport appeared first on The State of Security.
Read more

How Harmless Is Your Company’s Paramount Data?

In today’s rapid technological evolution, information from particular sources can be easily accessed, copied and shared out to a larger audience. If an organization fails to complete its basic role of being a guardian of the confidential business information within the company, it could convey unfavorable effects for business’ stability and sustainability in the long … Read More The post How Harmless Is Your Company’s Paramount Data? appeared first on The State of Security.
Read more

Workplace Health and Safety a Vital Component of Mature Risk Management

Businesses of all types are being transformed by technology, and so are the many kinds of workplaces that support their operations. Changing business strategies and increased productivity lead to rapid changes in process, which often means that executives lack a full understanding of the impact on the health and safety of employees and third parties. The post Workplace Health and Safety a Vital Component of Mature Risk Management appeared first on TechSpective.
Read more

Evolution Of ATM Theft: Sledgehammers To Skimmers

Over 10 billion transactions are performed every year at ATMs, and there are over 425,000 of these cash-dispensing machines throughout the U.S. for a total of 3,000,000 used globally. ATMs hold anywhere from $3,000 to upwards of $100,000 per machine, so they naturally become a prime target for thieves. Physically breaking open an ATM is not trivial, … Read More The post Evolution Of ATM Theft: Sledgehammers To Skimmers appeared first on The State of Security.
Read more

What is the State of Your Union?

Regularly the President of the United States delivers the State of the Union address. This practice "fulfills rules in Article II, Section 3 of the U.S. Constitution, requiring the President to periodically give Congress information on the "state of the union” and recommend any measures that he believes are necessary and expedient.". What if you as an information security leader held an information security State of the Union address with the explicit purpose of educating both your leaders and business partners on your information security program and the areas of focus for the next...
Read more

7 Things To Consider When Creating An Acceptable Use Policy

If you have read any of my posts or attended my webinars about security awareness, training, compliance, or other IT risk management items, you will notice a recurring theme: expecting technology to do all of the work in preventing a security or risk-related event is not the correct mindset. Rather, creating a culture of risk … Read More The post 7 Things To Consider When Creating An Acceptable Use Policy appeared first on The State of Security.
Read more
Page 1 of 212