President Joe Biden's cybersecurity team is beginning to take shape, with three appointments recently announced, including Michael Sulmeyer as senior director for cyber.
Cloud security trends like “shift-left security” and “DevSecOps” refer to new strategies and paradigms that help organizations keep workloads secure in the age of cloud-based, scale-out, constantly changing applications and infrastructure.
Many in IT, security, and development probably understand what these...
The latest edition of the ISMG Security Report describes new details emerging from the SolarWinds supply chain hack investigation. Also featured: A discussion of why security education is so crucial in 2021 and tips on how to retain security and operations center analysts.
Your cloud journey is unique, but a new guide shows there are common patterns that steer you to the best approach for a successful outcome.
Learn which cloud adoption pattern your organization aligns with, key risks, recommendations and important questions to ask yourself at each stage of your journey.
This 2020 Gartner guide recognizes the importance of both manual and automated NDR capabilities and why enterprises should determine early on which response strategy best meets their security goals.
Learn why network detection and response (NDR) must be a core component of any security strategy in today’s dynamic...
Among remote workers, senior managers apparently are taking cybersecurity hygiene far less seriously than rank-and-file employees, a recent survey shows. Kathy Ahuja of OneLogin offers an analysis.
Stuck on the cybersecurity treadmill?
Download Cisco's report, Simplify to Secure, to find out why your organization should strive for integrated cybersecurity and learn practical steps you can take to accomplish it.
How to Build a Resilient SOC for Today and the Future
Today’s business environment entails a tremendous amount of data, along with many new applications, technologies, and security risks, all of which make the need for an effective security operation center critically important
Download this eBook which outlines a...
When your business only has to secure one or two small environments, the traditional, on-premises logging approach can suffice.
But as environments grow in scale and spread across multiple data centers and cloud providers, you need one place to store all the logs, metrics, and events related to security. That’s...
The White House has issued a National Maritime Cybersecurity Plan designed to help improve security by eliminating conflicting standards and identifying cyber risks.
Organizations are using DevOps and Agile practices, coding in containers
and microservices, and adopting Kubernetes at a record pace to help
manage all these components. Even five years ago, the level of agility,
speed, and flexibility the cloud-native stack enables was but a dream.
Since Google first introduced...
The latest edition of the ISMG Security Report offers leadership lessons from Equifax CISO Jamil Farshchi and Mastercard's deputy CSO, Alissa "Dr. Jay" Abdullah. Also featured: An assessment of cybersecurity priorities for President-elect Joe Biden.
Today’s visionary executives know that having a strong personal brand can also have a big impact on the perception of their company brand.
Elon Musk, Jeff Bezos, Richard Branson, and Bill Gates are household names. So strong is their personal brand that it’s inseparable from their companies. Bezos is Amazon,...
Motivation, retention, and support are the crucial components of every successful security awareness training program. After you’ve got your program in place and it’s optimized to motivate adult learners, you can start to focus on improving the ‘stickiness’ of your program by focusing on improving your...
In light of the SolarWinds supply chain breach and other security incidents, the United States has substantial work to do in building a resilient digital infrastructure, says David Forscey of the Aspen Cyber Group, who outlines a five-step road map.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.