News

State cybersecurity office bill introduced after breach
The Front

State cybersecurity office bill introduced after breach

The Western Front is the official newspaper of Western Washington University in Bellingham, Washington.
Federal IT Security: What Is Supply Chain Risk Management?
FedTech Magazine

Federal IT Security: What Is Supply Chain Risk Management?

For Federal IT professionals, security is top priority. Learn why having a supply chain risk management strategy in place is critical for cybersecurity.
Telehealth’s emergence and the keys to security in 2021
Security Magazine

Telehealth’s emergence and the keys to security in 2021

Telehealth was an unexpected technology bright spot in 2020, as the Office for Civil Rights (OCR) relaxed enforcement of certain aspects of HIPAA, helping to reduce COVID exposure via virtual rounding and virtual visits. Unfortunately, bad actors have shown a lack of morality in their pursuit of illegal profits and have continued to attack medical organizations. Ransomware attacks, for example, can cripple a hospital’s abilities to provide high-quality patient care by denying access to key computer systems, which would force medical professionals to have to treat . . .
TechTarget

2021 IT priorities require security considerations

AI, IoT, 5G and increased cloud usage are top 2021 IT priorities for CIOs and CTOs, along with addressing the challenges of pandemic response. IEEE experts offered advice on proper security considerations for each of these trends in 2021.
Maximizing the Impact of Data Analytics
CIO

Maximizing the Impact of Data Analytics

Analytics-led decision making can boost productivity and innovation and reduce security risks and fraud. Yet enterprises will be hard pressed to reap business benefits without a proper game plan for operationalization.
Strike a balance: Ensuring secure remote work without hindering productivity
CIO

Strike a balance: Ensuring secure remote work without hindering productivity

The expanded remote workforce requires a balanced, secure approach to accessing data, apps, and systems.
How to ensure virtual roadshows, negotiations are safe amid COVID-19
CFO Dive

How to ensure virtual roadshows, negotiations are safe amid COVID-19

Even after the pandemic recedes, virtual meetings will likely remain popular. Here’s how to host them in a way that minimizes liability.
What is the last thing to do before the end of the year?
CSHub

What is the last thing to do before the end of the year?

Insights from keeping an 'extra' eye focused on the holiday season, assessing this past year in total, doing an inventory of risk, budgeting and insuring for risk, user engagement to business enablement are covered.
Open Source Mindset Bolsters Hybrid Cloud Strategies
CIO

Open Source Mindset Bolsters Hybrid Cloud Strategies

Cloud-friendly open source models can help organizations drive their hybrid strategies to solve for today’s changing digital business requirements.
Thinkers360 Predictions Series – 2021 Predictions for Cybersecurity
Thinkers360

Thinkers360 Predictions Series – 2021 Predictions for Cybersecurity

Thinkers360 2021 Predictions for Cybersecurity are part of a series providing actionable insights for business and technology executives
Threat Landscaping
CSHub

Threat Landscaping

Threat intelligence is one of those posture-forward initiatives. Our upcoming Year-End Report will shed light on the fact that it is a growing focus for the community. In concert with that growing focus, we asked a few of our close friends, what has changed and what should executives do now?
IT’s New Normal
CIO

IT’s New Normal

Recalibrating IT management and security for the post-COVID world
Telehealth is Booming: Here’s What You Need to Know
IEEE Transmitter

Telehealth is Booming: Here’s What You Need to Know

Telehealth, often referred to as virtual doctor appointments, has been utilized in remote regions that do not have local medical resources for several
Interview with Kayne McGladrey – vCISO / Spokesperson / Global Cybersecurity Thought Leader / Strategy and GRC Practice Lead
The Security Noob

Interview with Kayne McGladrey – vCISO / Spokesperson / Global Cybersecurity Thought Leader / Strategy and GRC Practice Lead

A blog about digital forensics and incident response with a smidgen of hacking thrown in.
What Is a Cross-Site Scripting (XSS) Attack & Are You Prepared?
FedTech Magazine

What Is a Cross-Site Scripting (XSS) Attack & Are You Prepared?

Cross-site scripting attacks can leave private, critical information vulnerable to cyberattackers. Learn more about XSS attacks and how you can prevent them.
The COVID-19 Pandemic Has Become a Catalyst for Cyberattacks
CIO

The COVID-19 Pandemic Has Become a Catalyst for Cyberattacks

Members of IDG’s Influencer Network assess the Impact of delayed security projects and look to the future.
CISO Perspectives: Zero Trust-As-A-Service
CSHub

CISO Perspectives: Zero Trust-As-A-Service

Gain perspective on: The shift in security challenges, current security concerns, and future challenges; Main components of Zero Trust-as-a-Service; Zero Trust-as-a-Service implementation and deployment best practice; How Zero Trust-as-a-Service solving security challenges in a hybrid IT environment
CISO Strategies & Tactics For Incident Response
CSHub

CISO Strategies & Tactics For Incident Response

The CSHub community provides feedback on how Incident Response, mindset, strategy, tactics and tech have evolved. And they share their thoughts on where we go from here.
How CISOs Follow The Money
CSHub

How CISOs Follow The Money

The Crown Jewels, Internal Dollars, Funded Adversaries, VC Money, Value At Risk, Business Alignment shared as options of how to follow the money. Also suggested are a few ways to protect the organizations by not following the money.
Data Is The New Perimeter
CSHub

Data Is The New Perimeter

The castle and moat strategy worked well when everything was inside the castle. But as cloud migration began and remote work continued, the perimeter expanded. With global enterprise moving to a distributed structure reality, visibility over data in transit is truly an issue.