Tag "CISO"

Back to homepage
Expert Articles

Governance, Risk and Compliance – Enacting Proactive Risk Management

By Tom Kellermann, Chief Cybersecurity Officer for Carbon Black, In the highly regulated industries of finance, healthcare and energy, a focus on governance, risk and compliance (GRC) is crucial to

Software

True passwordless authentication is still quite a while away

The password has been one of the great inventions in the history of computing: a solution that allowed simple and effective identity and access management when the need arose for it. Unfortunately,

Software

The importance of hardening firmware security

It’s no secret that attackers traditionally go after low-hanging fruit when hacking a system. Historically, this has meant targeting user applications, and, for deeper persistence, the operating system (OS) kernel

Software

Radical Transparency and Zero Trust: Putting Concept into Practice

Enterprise CIOs, CSOs and VPs of security need business outcomes and a positive ROI from their MSSP. One way to achieve this level of trust is with radical transparency with zero

Software

The importance of IT asset management within digital transformation processes

In this Help Net Security podcast, Marco Rottigni, Chief Technical Security Officer for Qualys across EMEA, talks about the importance of IT asset management within digital transformation processes. He illustrates why it’s

Cloud

How businesses can become more nimble and secure by moving to the cloud

Today’s business landscape is more dynamic than ever before. Organizations are being inundated with data, generated by an ever-increasing number of connected devices and systems. According to IDC, volume of

Industry Insights

Inside the NIST team working to make cybersecurity more user-friendly

Cybersecurity is usually not a user’s primary duty, yet they suffer an increasing burden to respond to security warnings, maintain many complex passwords, and make security decisions for which they

Artificial Intelligence

How CIOs Avoid Extinction with AI, ML & New Governance for Digital Transformation – Anything Else?

The International Data Corporation (IDC) sees it this way  “CIOs must reinvent IT top to bottom, create new digital platforms with agile connectivity, and modernize legacy systems or risk professional extinction.” Here are the predictions and some

Software

What can financial institutions do to improve email security?

Financial institutions are in a fully-fledged war against data breaches. And rightly so – the finance sector is a frequent target of ransomware, phishing, and other malicious attacks. Sensitive communications

Identity Theft

Why identity is the foundation of security

Once upon a time, companies secured their valuable information by locking file cabinets and installing passwords and firewalls around databases and systems in office-based computers. Maybe they also had video