Articles

 

  • Creating a Culture of ‘DevSecOps’

    A growing legion of industry observers are highlighting the need to better incorporate security into application development. The application layer is often highly vulnerable to both insider threats and attacks from external adversaries.

  • Core Traits of a Successful CISO

    Companies and government agencies need a multi-faceted strategy for identifying, addressing, and countering cyber attacks: State-of-the-art tools. A well-conceived risk assessment methodology. Assembling the right mix of cyber skills. Successful CISOs possess other core attributes as well, according to Stephen Spagnuolo, Managing Director at ZRG Partners.

  • Shifting Cyber Security from a Liability to a Productivity Boost

    Some cyber security leaders recognize opportunities to shift the mindset from cyber security as a liability to instead leverage security practices to boost productivity. Clif Triplett, Sr. Cyber Security Advisor for the U.S. Office of Personnel Management, weighs in on the topic.

  • Information Security in Healthcare: Protecting the Patient

    When it comes to cyber security, the healthcare industry is in a precarious position. Investment in cybersecurity has historically lagged other industries such as financial services. And as patients and practitioners increase their use of remote patient monitoring devices, this is placing added pressure on cybersecurity professionals.

  • Mitigating Risk via Better Data Protection

    There are obvious reasons why security teams take extensive measures to protect the organization's network to prevent bad guys from accessing and misappropriating data. In the end, it's ultimately about protecting the company's most sensitive data and keeping it out of the wrong hands.

  • Addressing Nation-State Cyber Security Threats to the Enterprise

    Nation-state actors - hackers that directly support national governments or those that are organized crime entities hired by a national government - have become progressively more sophisticated. Despite the challenges, there are steps that CISOs can take to detect nation-state intruders.