By Topic
By Industry
By Product Category
By Features
By Technology
By Services
By Audience
By Language
Displaying 481 - 510 of 621
Security Roundtable Article
FORGE Cyber Governance Playbook
Cyber governance remains a fundamental issue for corporate leadership. It is the role of a company’s board to be attuned to the changing nature of cyber risk and to ensure their company is employing appropriate risk oversight strategies to defend, respond, and recover from attacks. Within this playbook are real-world stories and lessons learned, key analytics, practical cyber risk oversight...
FORGE,
Security Roundtable Article
The Evolving Role of the CISO: From Risk Manager to Business Enabler
One of the first things I do in my role as chief security officer is reach out to …
Justin Somaini,
Security Roundtable Article
Cybersecurity And The New CISO
As chief cybersecurity advisor, I regularly receive requests from recruiters working in the field. Acknowledging the economic forces …
Security Roundtable Article
Goodbye Ransomware, Hello Cryptojacking!
If you had trouble last fall checking your elected officials’ claims on Politifact or streaming Homeland on Showtime …
Mercedes Cardona,
Security Roundtable Article
Three Important Considerations for CEOs Navigating Cyber Risk
Get your copy of Navigating the Digital Age here.
Philip L. Gordon,
Security Roundtable Article
Managing Different International Attitudes Towards Cyber
Get your copy of Navigating the Digital Age here.
Steve Durbin,
Security Roundtable Article
How Blockchain Really Intersects With Artificial Intelligence
Companies that choose to stay invested in older technologies inevitably fade into the background, while those who undergo …
Security Roundtable Article
Back to Basics: A Lesson Brought to You by Facebook
“You can’t fix stupid,” a security executive recently told me when I asked about the state of security …
Fritz Nelson,
Security Roundtable Article
Agency CIOs Still Don’t Have Mandated Authorities
The onus to improve the use and management of technology in the federal government has been put squarely …
Security Roundtable Article
Trading Apps Expose Investors to Cyber Criminals
Dozens of applications used for online trading by retail investors have cybersecurity vulnerabilities, some of which could lead …
Security Roundtable Article
Key Questions to Ask When Assessing Third Party Outsourcing
Get your copy of Navigating the Digital Age here.
Libbie Canter,
Security Roundtable Article
Talent Shortage Is A Problem But Not Your Cybersecurity Problem
In 1911, IBM founder Thomas Watson Sr. is said to have first uttered his trademark slogan “Think” when …
Mike Perkowski,
Security Roundtable Article
SEC’s New Toughness On Breach Reporting And What It Means For Your IT Compliance
In 2011, the Securities and Exchange Commission (SEC) warned public companies that cybersecurity incidents and security risks in …
Security Roundtable Article
Xerox CISO on Why the Tech Industry Needs to Simplify
TechRepublic’s Dan Patterson interviewed Alissa Johnson, Xerox Chief Information Security Officer, at Black Hat. She discussed defining IT processes, simplifying the …
Security Roundtable Article
Three Brexit Considerations for Business and Technology Executives
While it is still too early to specifically understand the impact of Brexit, it is important to watch …
Dan Lohrmann,
Security Roundtable Article
The Security of Cellular Connections
That free Wi-Fi network may not be so free if it is unsecured and someone hijacks your data. …
Security Roundtable Article
Avoid Buzzwords: There Is No DevSecOps (Opinion)
Could you imagine a civil engineer designing a bridge without considering the safety features and requirements of their …
Craig Templeton,
Security Roundtable Article
The Votes Are In: Election Security Matters
No matter what side of the political divide on which one falls, everyone agrees that the security and …
Security Roundtable Article
Don’t Leave out Law Enforcement in Cybersecurity Planning
Data manipulation is all over the news these days, in more ways than one. It is in the …
Al Perlman,
Security Roundtable Article
How Cyber Risk Differs from Other Risks
Get your copy of Navigating the Digital Age here.
Ken Daly,
Security Roundtable Article
Talent Shortage Is the Biggest Threat in Cybersecurity
As the number of cyberthreats that businesses face continues to rise, the demand for cybersecurity professionals has soared …
Security Roundtable Article
Social Engineering Attacks Are on the Rise: Here’s What You Can Do
In today’s environment, professional attackers know how to avoid your security technology by using social engineering and picking …
Yorck O.A. Reuber,
Security Roundtable Article
Why Is It Important to Build Increasingly Diverse Security Teams?
Effective cybersecurity represents the greatest challenge of the online age. This applies all the way from protecting the data held …
Security Roundtable Article
Are You at Risk? Understanding Your Cyber Risk Appetite
What is your company’s appetite for cyber risk? Are you even aware of how much risk your company …
Dr. Earl Crane,
Security Roundtable Article
Business Enablement Through Cybersecurity: Why It’s Necessary and How to Make it Happen
How do you and your IT teams view cybersecurity? If your organization views cybersecurity as a “necessary evil” …
Al Perlman,
Security Roundtable Article
Cybersecurity Policy: Another Supply Chain Juggling Act
Supply chain executives have tough jobs, dealing with natural disasters, trade wars, spikes in demand – to absolutely, …
Karen Lynch,
Security Roundtable Article
IoT is the Eyes and Hands of the Cloud
Inflection points often become inflection points because of the convergence–sometimes planned, sometimes serendipitous–of multiple factors. It happened with …
Mike Perkowski,
Security Roundtable Article
In The Wake Of GDPR, It Can’t Be Business As Usual With Consumer Data Privacy
With the EU’s General Data Protection Regulation (GDPR) comes an unprecedented paradigm shift in data privacy regulation. The new California Consumer …
Security Roundtable Article
A 6-Part Tool for Ranking and Assessing Risks
One of the most overused expressions thrown around by wannabe “Wall Street Rambos” is business is war. But sometimes …
Security Roundtable Article
Big U.S. Banks Face Increase in Attempted Cyberattacks
Some large U.S. banks have seen an uptick in attempted cyberattacks in recent weeks, according to people familiar …
Displaying 481 - 510 of 621