How science can fight insider threats
Malicious insiders pose the biggest cybersecurity threat for companies today because they can cause the most damage, and are much harder to detect than outsiders. From the …
The risk to OT networks is real, and it’s dangerous for business leaders to ignore
Data from the new CyberX CyberX Global ICS & IIoT Risk Report shows major security gaps remain in key areas such as plain-text passwords, direct connections to the …
How to make the CFO your best cybersecurity friend
I’m bad dinner company. As the CFO of a cloud technology provider, I like to speak about finance and cybersecurity, two topics entirely capable of putting my dinner guests to …
Safeguarding hybrid-cloud infrastructures through identity privilege management
Most enterprises have embraced the advantages a cloud infrastructure can bring to their computing, storage, network or other needs, and many are juggling multiple cloud …
Why you should take an operational approach to risk management
Combining two seemingly unrelated entities to make a better, more useful creation is a keystone of innovation. Think of products like the clock radio and the wheeled suitcase, …
Solving the cloud infrastructure misconfiguration problem
Security incidents involving cloud infrastructure have become a regular occurrence since many organizations began shifting their assets to the cloud. Many of these incidents …
Clarity and focus on security required for successful digital transformation
Digital transformation is all around us. Even if you are living under a rock, I am sure you have great Wi-Fi reception and are still able to do your shopping, pay your bills, …
Knowing how to define, screen and monitor your third parties is essential to minimizing risk
A new NAVEX Global survey found that more than a third of organizations still use paper-based records or disparate office productivity software to administer their third-party …
How corporate boards are navigating cybersecurity risks and data privacy
Digital transformation initiatives have transcended beyond the sole domain of IT to involve the entire organization, elevating digital strategy to the top of the board agenda, …
Few organizations use cyber wargaming to practice response plan
Nearly half (46 percent) of executive-level respondents to a Deloitte poll say their organizations have experienced a cybersecurity incident over the past year, with more than …
9 in 10 organizations have a cybersecurity culture gap
With cybersecurity threats continuing to escalate worldwide, the ISACA/CMMI Institute Cybersecurity Culture Report found that just 5 percent of employees think their …
You are who you say you are: Establishing digital trust with the blockchain
Over the last few years, blockchain use has gained popularity driven partly by the interest in cryptocurrency, but mostly with the growing understanding of what distributed …