Post Types Latest Press Coverage FedTech MagazineWhat Is a Cross-Site Scripting (XSS) Attack & Are You Prepared? Oct 13, 2020Cross-site scripting attacks can leave private, critical information vulnerable to cyberattackers. Learn more about XSS attacks and how you can prevent them. CIOThe COVID-19 Pandemic Has Become a Catalyst for Cyberattacks Oct 6, 2020Members of IDG’s Influencer Network assess the Impact of delayed security projects and look to the future. CSHubCISO Perspectives: Zero Trust-As-A-Service Sep 18, 2020Gain perspective on: The shift in security challenges, current security concerns, and future challenges; Main components of Zero Trust-as-a-Service; Zero Trust-as-a-Service implementation and deployment best practice; How Zero Trust-as-a-Service solving security challenges in a hybrid IT environment CSHubCISO Strategies & Tactics For Incident Response Aug 31, 2020The CSHub community provides feedback on how Incident Response, mindset, strategy, tactics and tech have evolved. And they share their thoughts on where we go from here. CSHubHow CISOs Follow The Money Aug 26, 2020The Crown Jewels, Internal Dollars, Funded Adversaries, VC Money, Value At Risk, Business Alignment shared as options of how to follow the money. Also suggested are a few ways to protect the organizations by not following the money. CSHubData Is The New Perimeter Aug 12, 2020The castle and moat strategy worked well when everything was inside the castle. But as cloud migration began and remote work continued, the perimeter expanded. With global enterprise moving to a distributed structure reality, visibility over data in transit is truly an issue. CSHubThe New CISO Journey Includes Tried & True Old Steps Aug 5, 2020The new CISO journey might be different with new starting points and new stops along the way. But without technical and technological know-how that journey can end in disaster. The new CISO journey must still include the paramount step of understanding the tech. ZDNETData privacy and data security are not the same Aug 3, 2020It's not just semantics. Companies that fail to understand the differences between data privacy and data security put their brands and bottom lines in jeopardy. CSHubWhat Is The Most Cogent CISO Reporting Structure? Jul 29, 2020Reporting for duty is a pleasure for the modern CISO. Thwarting threats to the enterprise is an effort that delights that particular executive. But those threats have expanded exponentially for myriad reasons involving every person in an ever enlarged distributed corporate value chain. Futureproofing : NextFutureproofing Now (Season #2, Ep. 11) – Cybersecurity & Cybertrust – Predictions & Implications Jul 14, 2020An interactive webcast presented by the global innovation++ practice Futureproofing : Next (futureproofingnext.com)Co-Hosts: Andrea Kates & Sean Moffitt CIOLessons in IT resiliency for the COVID-19 era Jul 10, 2020Rapid response to disruptions caused by the pandemic will lead to better continuity plans going forward, participants in an #IDGTECHtalk Twitter chat said. Grey Swan GuildAlthough 2020 is the year of the crisis, only one is new Jul 4, 2020We each will choose how to respond to this year of crises. Cybersecurity professionals have an unparalleled opportunity to help. CSO OnlineA 10-point plan to vet SaaS provider security Jun 8, 2020Using a software-as-a-service provider means giving up some control over security, so close vetting of SaaS security during vendor evaluation is critical. CIOAssessing the Value of Corporate Data May 7, 2020Data can deliver business value in many ways–from helping companies optimize operations to improving customer experience and loyalty. But the most valuable data also requires the most protection. CSO Online10 ways to get more from your security budget Apr 27, 2020In today's economic climate, CISOs have to make every penny count and maximize every dollar. Here’s how some do that. Technology Solutions That Drive EducationHow Artificial Intelligence is Solving Cybersecurity Talent Shortages Apr 23, 2020The cybersecurity skills shortage is well documented, but the gap seems to be widening. Can artificial intelligence and automation solve the cybersecurity skill gap? Dark ReadingPost Pandemic, Technologists Pose Secure Certification for Immunity Apr 16, 2020Going digital with immunity passports could speed rollout and allow for better warnings of potential hot spots. But security and privacy issues remain. IEEE TransmitterHow to Keep Your Video Conferences Secure From Intruders Apr 16, 2020Protect your students, employees, families and yourself from cyber disruptions. Here are our cybersecurity tips for safe video conferencing. Communications of the ACMGive Tax Time Phishing Attacks the Slip Apr 14, 2020Every year, phishing scammers seek to trick people into forking over their tax refunds or handing over their passwords and PINs. CSHubCyber Security Is Integral To Business Continuity Planning Apr 6, 2020Communications are critical for an organization when an incident occurs. Threat actors will also use a disruption to business operations as an opportunity to spread misinformation. Steps are available to ensure that cyber security has a voice in disaster recovery and business continuity planning. Previous Next