Tag "CISO"

Back to homepage
Industry Insights

How can we give cybersecurity analysts a helping hand?

It’s tough being a cybersecurity analyst these days. Over the last few years we have been repeatedly reminded of the challenge they are now facing, primarily through the steady stream

Hardware/Network

Security spring cleaning: 5 tips for tidying up network safeguards

Networks need regular cleaning just like your home, car or garage. Why? The answer is simple – poor security hygiene can lead to major data breaches. If you don’t regularly review your

Industry Insights

Cybersecurity skills shortage still the root cause of rising security incidents

The cybersecurity skills shortage is worsening for the third year in a row and has impacted nearly three quarters (74 percent) of organizations, as revealed in the third annual global study of

Industry Insights

Solving The Cybersecurity Talent Gap Today, Tomorrow And Beyond

An estimated 4  billion-plus records were compromised in the first half of 2018 alone, and if you watched the news at any point during the rest of 2018, you know it didn’t end

Industry Insights

What CISOs should focus on when deciding on a strategy

The effectiveness of an organization’s security strategy and implementation can sometimes be difficult to assess. Michael Hamilton, President and CISO of CI Security, says looking at a number of key

Identity Theft

A deeper look: How the 281 data breaches in Q1 2019 will impact companies

High-profile data breaches show no sign of slowing down. In the first quarter of 2019, there were 281 reported data breaches, exposing more than 4.53 billion records. Companies have overlooked the

Hardware/Network

Securing satellites: The new space race

A decade ago, it would have cost you a billion dollars to deploy a satellite into space. Fast forward ten years and you can now have your own personal satellite

Industry Insights

Is curiosity killing patient privacy?

The digitization of healthcare is changing the face of fraud. With the growth of electronic health records (EHRs), online patient portals and virtual clinics, a wealth of sensitive medical information

Cloud

Executing a multi-cloud strategy: Crawl, walk, run

Despite many challenges, enterprises are increasingly adopting cloud computing in an effort to become more agile, lower IT costs, and have the ability to scale. Most of those companies have or are

Software

What will phishers do once push-based MFA becomes widely used?

As phishing continues to be the number one method for initiating a breach, investing in anti-phishing technologies or training – preferably both – should be a no-brainer for most companies.