News

The COVID-19 Pandemic Has Become a Catalyst for Cyberattacks
CIO

The COVID-19 Pandemic Has Become a Catalyst for Cyberattacks

Members of IDG’s Influencer Network assess the Impact of delayed security projects and look to the future.
CISO Perspectives: Zero Trust-As-A-Service
CSHub

CISO Perspectives: Zero Trust-As-A-Service

Gain perspective on: The shift in security challenges, current security concerns, and future challenges; Main components of Zero Trust-as-a-Service; Zero Trust-as-a-Service implementation and deployment best practice; How Zero Trust-as-a-Service solving security challenges in a hybrid IT environment
CISO Strategies & Tactics For Incident Response
CSHub

CISO Strategies & Tactics For Incident Response

The CSHub community provides feedback on how Incident Response, mindset, strategy, tactics and tech have evolved. And they share their thoughts on where we go from here.
How CISOs Follow The Money
CSHub

How CISOs Follow The Money

The Crown Jewels, Internal Dollars, Funded Adversaries, VC Money, Value At Risk, Business Alignment shared as options of how to follow the money. Also suggested are a few ways to protect the organizations by not following the money.
Data Is The New Perimeter
CSHub

Data Is The New Perimeter

The castle and moat strategy worked well when everything was inside the castle. But as cloud migration began and remote work continued, the perimeter expanded. With global enterprise moving to a distributed structure reality, visibility over data in transit is truly an issue.
The New CISO Journey Includes Tried & True Old Steps
CSHub

The New CISO Journey Includes Tried & True Old Steps

The new CISO journey might be different with new starting points and new stops along the way. But without technical and technological know-how that journey can end in disaster. The new CISO journey must still include the paramount step of understanding the tech.
Data privacy and data security are not the same
ZDNET

Data privacy and data security are not the same

It's not just semantics. Companies that fail to understand the differences between data privacy and data security put their brands and bottom lines in jeopardy.
What Is The Most Cogent CISO Reporting Structure?
CSHub

What Is The Most Cogent CISO Reporting Structure?

Reporting for duty is a pleasure for the modern CISO. Thwarting threats to the enterprise is an effort that delights that particular executive. But those threats have expanded exponentially for myriad reasons involving every person in an ever enlarged distributed corporate value chain.
Futureproofing Now (Season #2, Ep. 11) – Cybersecurity & Cybertrust – Predictions & Implications
Futureproofing : Next

Futureproofing Now (Season #2, Ep. 11) – Cybersecurity & Cybertrust – Predictions & Implications

An interactive webcast presented by the global innovation++ practice Futureproofing : Next (futureproofingnext.com)Co-Hosts: Andrea Kates & Sean Moffitt
Lessons in IT resiliency for the COVID-19 era
CIO

Lessons in IT resiliency for the COVID-19 era

Rapid response to disruptions caused by the pandemic will lead to better continuity plans going forward, participants in an #IDGTECHtalk Twitter chat said.
Although 2020 is the year of the crisis, only one is new
Grey Swan Guild

Although 2020 is the year of the crisis, only one is new

We each will choose how to respond to this year of crises. Cybersecurity professionals have an unparalleled opportunity to help.
A 10-point plan to vet SaaS provider security
CSO Online

A 10-point plan to vet SaaS provider security

Using a software-as-a-service provider means giving up some control over security, so close vetting of SaaS security during vendor evaluation is critical.
Assessing the Value of Corporate Data
CIO

Assessing the Value of Corporate Data

Data can deliver business value in many ways–from helping companies optimize operations to improving customer experience and loyalty. But the most valuable data also requires the most protection.
10 ways to get more from your security budget
CSO Online

10 ways to get more from your security budget

In today's economic climate, CISOs have to make every penny count and maximize every dollar. Here’s how some do that.
How Artificial Intelligence is Solving Cybersecurity Talent Shortages
Technology Solutions That Drive Education

How Artificial Intelligence is Solving Cybersecurity Talent Shortages

The cybersecurity skills shortage is well documented, but the gap seems to be widening. Can artificial intelligence and automation solve the cybersecurity skill gap?
Dark Reading

Post Pandemic, Technologists Pose Secure Certification for Immunity

Going digital with immunity passports could speed rollout and allow for better warnings of potential hot spots. But security and privacy issues remain.
How to Keep Your Video Conferences Secure From Intruders
IEEE Transmitter

How to Keep Your Video Conferences Secure From Intruders

Protect your students, employees, families and yourself from cyber disruptions. Here are our cybersecurity tips for safe video conferencing.
Communications of the ACM

Give Tax Time Phishing Attacks the Slip

Every year, phishing scammers seek to trick people into forking over their tax refunds or handing over their passwords and PINs.
Cyber Security Is Integral To Business Continuity Planning
CSHub

Cyber Security Is Integral To Business Continuity Planning

Communications are critical for an organization when an incident occurs. Threat actors will also use a disruption to business operations as an opportunity to spread misinformation. Steps are available to ensure that cyber security has a voice in disaster recovery and business continuity planning.
3 Ways Artificial Intelligence (AI) Can Improve Campus Cybersecurity
Technology Solutions That Drive Education

3 Ways Artificial Intelligence (AI) Can Improve Campus Cybersecurity

Colleges and universities are using AI technologies to gain more actionable cybersecurity insights. Learn 3 ways AI is improving campus security.