A reference resource for the CIO and the CISO on cyber security, looking beyond the technology horizon into leadership, management, culture, governance, resilience and the real dynamics of security transformation
With security professionals facing long-term consequences from job pressure, it’s crucial to understand the root causes and explore solutions. What’s driving this stress, and how can business leaders step up to protect their employees’ well-being?
Enterprises have been piling up on cybersecurity tools and products that have yet to be effectively operationalized to drive operational effectiveness and reduce risk.
Major entities continually stumble in the face of persistent cyber threats, despite having abundant resources at their disposal. It is particularly frustrating when the cybersecurity landscape is flooded with tools and solutions targeting specific threats...
MIT researchers created a generic framework that enables an engineer or scientist to evaluate the effectiveness of defense schemes that seek to limit a hacker’s ability to learn secret information by observing the behavior of a victim computer program.
There are so many security tools in place today that there’s a risk that security teams rely too much on their toolsets and not enough on their cybersecurity strategy.
Many things challenge how we practice cybersecurity these days. Digital transformation has brought significant adoption of new technology and business models, including cloud solutions, e-commerce platforms, smart devices, and a significantly more distributed workforce. These, in turn, have brought with them an increase in new threats, risks, and cybercrime.
Process failures are the root cause of most serious cybersecurity incidents. We need to treat security as a process issue, not try to solve it with a collection of tools.
Organizations are still inviting trouble by using legacy tactics and a multitude of legacy tools, coupled with insufficient planning of their cybersecurity programs.
Compute and algorithms processing mountains of data is more efficacious than trying to hire cybersecurity professionals when there aren’t enough of them.
Security tool sprawl has made many teams so overwhelmed by security alerts that they can’t respond to them. Here’s how to deal with security tool overload. .
To get content containing either thought or leadership enter:
To get content containing both thought and leadership enter:
To get content containing the expression thought leadership enter:
You can enter several keywords and you can refine them whenever you want. Our suggestion engine uses more signals but entering a few keywords here will rapidly give you great content to curate.