asset management

5 Security Holes Most Often Revealed via Cybersecurity Asset Management

Although it may not get the buzz like AI, machine learning, zero-day or deception technologies, asset management is foundational to cybersecurity. Look behind many of the breaches and you’ll find a single, ...
Security Boulevard
business risk

IBM Launches Security Assessment Service Focused on Business Risk

IBM Security this week launched a service through which it will work with IT security professionals to assess the business risks cybersecurity vulnerabilities represent. Julian Meyrick, vice president for IBM Security, said ...
Security Boulevard
threat intelligence

The Value of Cybersecurity Ratings for CFOs

Security ratings may not be as well-known outside the security world, but in a nutshell, they evaluate an organization’s cybersecurity risk using data-driven metrics that provide visibility into an organization’s security posture ...
Security Boulevard
cloud security

How to Stop Data Breaches of Your Cloud Data

The post How to Stop Data Breaches of Your Cloud Data appeared first on CCSI ...
PCI DSS

Exposing the Culture of Compliance Cramming

Thursday, Feb. 1, marked the deadline for businesses to adopt the new industry standard, PCI DSS 3.2, aimed at reducing cyberattacks and promoting a better response to cyberattacks that result in payment ...
Security Boulevard