Infosecurity Opinions
Why I Don't Blame Boards for Underinvesting in Cybersecurity
Security professionals need to present boards with something much more arresting: metrics and indicators
We’re Going to Need a Better Plan
Considering that a typical power plant will have over 1000 discreet systems, creating an audit is a significant task.
Combining Threat Playbooks with AI to Stop Cyber-Criminals
Understanding tactics, techniques, and procedures of cyber-criminals has been a difficult and elusive element of threat intelligence
A Strong Cybersecurity Profile Enhances Company Value, Revenues and Growth
Cybersecurity has evolved to become an elemental business component that grows revenue and opens doors for market expansion.
Proactively Protecting Sensitive Data
Traditional cybersecurity defenses are insufficient, as the steady stream of data breaches indicates
Building a Cyber Risk Report Your Board Will Love
Cyber risk has emerged as one of the top risks to the enterprise so CISOs are being asked to report more frequently to the board
How Traditional SIEM Pricing Models Hamper Security
Traditional pricing models have so far been restrictive to security scalability
Why Are Security and Business Goals at Odds With Each Other?
CISOs need to take the time to listen to what the priorities of others in the business are and what they consider to be measures of success.
Combining Threat Playbooks with AI to Stop Cyber-Criminals
Understanding the tactics, techniques, and procedures of cyber-criminals has been one of the most difficult and elusive elements of threat intelligence
#HowTo Ensure Hybrid Cloud Security with Secure Endpoints
Anywhere/anytime computing is a reality.
Stop Throwing Spaghetti at the Wall
The SOC Visibility Triad signifies a massive paradigm shift in cybersecurity
Bluetooth Hacks Keep Evolving, Will Your Cybersecurity Strategy?
Is the concern about connected security in the office being overhyped?
Security is Only as Strong as the Weakest Link
What if the weak spot was in the foundation to which the chain was connected?
Keeping SOC Costs Down While Improving Security – Is it Possible?
If the personnel just aren't there, what's a SOC to do?
Plugging Third Party Data Leaks
Explosion in the use of cloud-based applications has increased the number of third parties holding a company’s data
The Catch 22 Scenario for GDPR
The process for enabling consumers the right to access their data is still ad-hoc for many organizations
Make it So: How Intent-Based Network Security Accelerates the Enterprise
How organizations can realize the benefits on IBN across their complex, hybrid networks
Your Best Bet for a Safe Ride? Buckle up With a Best Practice Security Framework
How will the ‘Good Guys’ respond? In two ways: ‘Innovation and Frameworks.’
Finding and Mentoring Your Next Key Security Hire
Security talent - the hidden treasure trove of the next great security professional within your company.
Securing Backups in an Automated Data Protection System
Securing backups from ransomware and authorized access in an automated data protection system