May 22, 2017
Cyber Security: How Vendor Roles Relate Cyber security threats are a real and present danger to company infrastructures today. The dynamic nature of cyberspace demands the implementation of dynamic security policies with layered defenses. Organizations must adhere to strict definitions and actions concerning network abuse, natural disasters, and outside infiltration. However, this isn’t just true for the business inf[…]
April 17, 2017
Developing Effective Risk Management Strategies that Meet Today’s Changing Threat Landscape The role of chief security officer (CSO) has necessarily evolved along with the advances made in technology. When new risks become evident, new regulations are instituted and emerging complexities are discovered, requiring the position of CSO to adapt to meet the changing security landscape. Today’s CSO faces a number of risks that span multidisciplinary areas, which before did[…]
April 3, 2017
Understanding Disconnect Challenges in the Digital World Over the past decade, IT evolution has been explosive. Businesses, individuals, and countries have quickly embraced the transformation offered by new technologies. Although the advantages of increased mobility, Internet of Things (IoT) technologies, and similar insightful solutions are easy to measure, crucial elements like security, privacy, and compliance often suffer from a […]
January 9, 2017
How Businesses Can Remain Protected from Data Breaches Data breaches are a much more common occurrence than they used to be, with tech criminals continuing to develop new technologies that can maneuver around firewalls and other security measures. Ultimately, a data breach means that protective measures have failed, allowing unauthorized access to sensitive data that can severely compromise many individuals. Data such as private em[…]
December 5, 2016
Improving Security for the IoT With the rise of the Internet of Things (IoT) has come greater conversation on security flaws and vulnerabilities. These vulnerabilities are often considered inherent, but this is largely due to the fact that the IoT is behind the curve on protection mechanisms, and manufacturers aren't focusing enough on improving their security. No business likes to have to clean up after a d[…]
October 5, 2016
Using IT Knowledge to Shape an SMB or Enterprise Vision Security incidents can cost a small- to medium-sized business (SMB) over $85,000, according to a recent study by Kaspersky Lab. The study additionally found that large businesses may pay as much as $861,000 for such incidents. This report reveals just how much a breach can affect a firm's financial health. Following are some important lessons on how IT knowledge that's gained f[…]
November 19, 2015
These days, there is simply too much threat data for security teams to effectively determine what is important and what is not. In order to overcome this problem, the way threat intelligence is handled needs to change. Collecting data for the sake of having it is a waste of physical resources, and sifting through the noise looking for signal can be an enormous drain on human re[…]
March 30, 2015
If anyone needs another indicator of how quickly online technologies are revolutionizing business, it's in how quickly companies are having to add C-level employees to deal with tech issues. Just a year or two ago, businesses were only starting to get used to the idea of having a Chief Information Officer at all. Times have changed. Today, cyber-crime problems have reached a ti[…]
January 22, 2015
The Best Security Practice for Success When success becomes the comfortable standard, it's easy to grow nonchalant about things that are important. Just because sales are high and customers are satisfied it doesn't mean there's not a need to assess current operations and plan for the future. Those who make this security mistake find themselves at risk when a new change in the industry rolls out and the business is n[…]
RECENT POSTS
ARCHIVES

CATEGORIES