Security and risk organizations place a lot of focus on vulnerabilities, and rightly so. These nasty flaws in systems and applications – if leveraged by miscreants – can result in millions of dollars in losses, in addition to significant reputational damage. Enterprises, both large and small, all have vulnerability management programs. However, there are significant […]
Check out our new “intergraphic” – an interactive graphic - that takes you inside the cockpit of a CISO.
The people within an organization that are closest to the crown jewels have to take an active role in guarding that information in the digital world, the same way they would in the physical world.
Forrester has coined this new acronym, so don’t be surprised when you start seeing "SUBA" pop up in headlines and data sheets shortly. Here's what the market research firm has to say about security user behavior analytics.
Although the benefits of information sharing are abundantly clear, many security practitioners fail to recognize how it should be a critical component of their security strategy.
Visibility is the name of the game when it comes to measuring an organization’s risk posture. For effective cyber risk management, it’s essential for CISOs to have the right visibility in order to understand what employees, strategic business partners, and third-party vendors are doing on the inside and how they are interacting with high-valuable assets. […]
This week security savants from around the world flocked to the Moscone Center for the RSA Conference 2016. In the midst of conference show floor activity that touted the latest security technologies that aim to give CISOs a good night’s sleep, a prominent group of security executives gathered at the W Hotel to discuss an […]
By Ryan Stolte, Co-Founder and Chief Technology Officer, Bay Dynamics Target. Home Depot. The Office of Personnel Management. These organizations (and many more) have two things in common – they all suffered a data breach and the attackers broke in through a third party vendor. According to the Ponemon Institute “Aftermath of a Data Breach Study,” 53 […]