Connecting Security to the Business
OSINT – Using Threat Intelligence to Secure Your Organisation
Tripwire Guest Authors | | business intelligence, Connecting Security to the Business, OSINT, Social networks, Threat analysis
In my first article on Cyber Security Threat Intelligence Analysts, (CTI analysts) we covered what a CTI analyst is and discussed how they can bridge the gaps between IT, Security, and the ...
The Cyber Threat Intelligence Analyst – Speaking Your Languge
Tripwire Guest Authors | | Business Impact Analysis, business intelligence, Connecting Security to the Business, Threat Intelligence
One item that comes up a lot in conversations is how security teams or IT teams struggle to speak the “business language” to business leaders, mainly to members of the senior leadership ...
Thunder on the Horizon: 4 Security Threats for the Cloud
David Bisson | | Cloud, Connecting Security to the Business, Data loss, encryption, Featured Articles
Security is both a benefit and a concern for enterprises when it comes to cloud computing. On the one hand, Datamation found in its State of the Cloud, 2019 survey that many ...
Mitigating Risks in Cloud Migration
Companies are moving to incorporate the cloud into their computing infrastructure at a phenomenal rate. This is, without question, a very positive move. It permits companies to scale processing resources up and ...
Why You Need to Align Your Cloud Strategy to Your Business Goals
Tripwire Guest Authors | | Business, Cloud, Cloud Security, cloud strategy, Connecting Security to the Business
Your company has decided to adopt the Cloud. Or maybe it was among the first ones that decided to rely on virtualized environments before it was even a thing. In either case, ...
Addressing The Elephant in the Room: Cybersecurity’s Increasing Talent Shortage
Tripwire Guest Authors | | Connecting Security to the Business, Cybersecurity, Off Topic, Skills, Talent
The cybersecurity space is in dire straits. Hackers are getting smarter and more sophisticated…and the availability of skilled men and women to combat them has never been lower. It’s an issue that’s ...
Rooted in Security Basics: The Four Pillars of Cyber Hygiene
David Henderson | | Connecting Security to the Business, cyber hygiene, Data management, Federal, government, log management, patch management, security
The term “cyber hygiene” pops up frequently in articles, blogs and discussions about cybersecurity. But what does it really mean? Some say it is an ill-defined set of practices for individuals to ...
Entering the Twilight Zone: Adventures in the Security Leader Search
Tripwire Guest Authors | | CISO, Connecting Security to the Business, Featured Articles, iam, Twilight Zone
If you’re in your 40s or 50s, you probably remember a TV series called The Twilight Zone. (Millennials, think Netflix’s Black Mirror). Every show was its own stand-alone story that took viewers ...
Selecting a Security Leader: Don’t Get Caught in No Man’s Land
Tripwire Guest Authors | | Breach, Connecting Security to the Business, Featured Articles, hacker, security leader
In World War I, the space between the most-forward trenches in a battle was called No Man’s Land – a place you didn’t want to be. I learned it as a tennis ...
Data Security Solutions for Small Businesses
Tripwire Guest Authors | | Connecting Security to the Business, Data breach, Featured Articles, Human Error, Password
Businesses that fail to take the steps necessary to protect their data, information and digital infrastructure are far more likely to suffer a data breach. A breach has the potential to do ...

