security & risk
Securing chaos: How Security Chaos Engineering tools can improve design and response
Why chaos engineering works and the best practices for implementing chaos engineering effectively ...
Survey Says Quantum Computing a Cybersecurity Threat
Now that quantum computers are moving from theory into the realm of experimental, many cybersecurity professionals are starting to appreciate a simple fact: Computers capable of cracking the most sophisticated encryption algorithms ...
The Secret Cost of a Frictionless Life
Is making it possible for people to board a plane faster worth compromising their privacy? Maybe. What about brokering their personal data for targeted marketing? Maybe not. All digital initiatives carry a ...
Take a Fresh Look at Your Annual Security Risk Assessment
The importance of a security risk assessment is clear: It helps healthcare organizations ensure their physical, technical and administrative safeguards are compliant with HIPAA requirements. It also assists in showing areas where ...
A v-CISO’s Take on the 5 Issues Facing Cybersecurity
A v-CISO is an on-demand consultant with a company’s leadership team with a good vantage point for spotting security issues In just 20 years, we’ve seen the cybersecurity field grow from virtually ...
The Cyber-Risk Paradox: Benefits of New Technologies Bring Hidden Security Risks
When attending cybersecurity conferences, you expect to learn a lot of interesting things surrounding data security, but my experience is that there is always one tidbit, one piece of information, that jumps ...
Your Employees Pose a Bigger Security Risk Than You Think
Ask a security expert what an organization’s biggest risk or threat is, they answer is almost always “the human factor.” While that could include anybody with access to your network or data, ...
Old Technology: We All Use It, But At What Risk?
How old technology may be introducing security risks to the corporate network We may think of today’s corporate America as a mobile workforce, with everybody conducting business from their phones or tablets ...
Vulnerable Web Applications Leave All Sectors at Risk
Coming into 2018, security professionals expected to see a continued increase in the use of websites as a means of infecting user workstations, according to a recently released report from Positive Technologies ...
How CISOs Can Successfully Talk Security to CEOs
It would be funny, if it were not so frustrating, that two individuals so intent on managing risk don’t understand one another. But that is the fundamental problem between business and security ...