Develop Heuristics to Detect Anomalous Activity

Detect Anomalous Activity Ahead of a Data Breach With Heuristics

No one knows your business better than you. You know when it looks normal or when it looks strange. If you don’t have an office in Shanghai, then why are there multiple ...
Working from Home Now? Here’s How to Do it Securely

Working from Home Now? Here’s How to Do it Securely

Most employees work from home only occasionally. The Coronavirus outbreak, however, has recently relegated millions of employees to home offices, kitchen tables, and living room couches. We do our part to flatten ...
Futurecon - Dallas

CISOs Enable Business Growth With This Strategy

Can you blame the CISO who wants to quash any tool, system, or process that invites risk into the organization? CISOs face embarrassing data breaches and unceremonious terminations when employees connect unauthorized ...

Why a Telephone Might Be the Best Tool to Stem Third Party Cyber Risk

Compliance checklists and attestations only go so far in mitigating cyber risk. They demonstrate a partner’s commitment to cybersecurity awareness however they only capture a snapshot in time. A vendor, contractor or ...
Protect Third Party Workflows With Security Infrastructure Integrations

Protect Your Third Party Workflows With Security Infrastructure Integrations

CISOs must use every tool at their disposal to protect their PII, PHI, and IP. Most security-first organizations spend millions of dollars on security tools from firewalls and hardened networks to endpoint ...
Strengthen Security and Governance with Metadata

Strengthen Data Security and Governance with Metadata

If you want to protect the sensitive data you share with third parties, you need to know everything you can about that data. What data is being shared? Who’s sharing it? With ...
Lock Down Your Sensitive Data With Powerful Data Encryption

Lock Down Your Sensitive Data With Powerful Data Encryption

If you owned a big, expensive diamond ring, would you leave it on the dashboard in an unlocked car or would you keep it locked in a safe and insure it? If ...
Chicago cybersecurity leaders

Successful CISOs Use This Essential Tool Sparingly

If you think looking for a needle in a hay stack would be tough, imagine looking for a needle in a needle stack. Not just any needle, but a very specific needle ...
Maintain control of your sensitive content with a private or on-premises cloud

Maintain Control of Your Most Sensitive Content With a Private or On-Premises Cloud

Anyone who has ever manufactured and sold a product in a competitive market will attest to Benjamin Franklin’s truism, “the bitterness of poor quality remains long after the sweetness of low price ...
Alan Levine, CISO for Alcoa (retired)

Want to Be a CISO? Know This First.

From the outside looking in, the CISO career appears pretty glamorous: lots of responsibility, lots of influence, and lots of technology. The reality unfortunately is quite different. Sure, there’s lots of responsibility, ...