
A layered approach to modern identity
The way we work is evolving. Traditional desktop computers and laptops are slowly giving way to the mobile device. From smartphones to tablets, a growing number of employees …

Chief Data Officers are increasingly enabling digital transformation
As the role of chief data officer (CDO) continues to gain traction within organizations, a recent survey by Gartner found that these data and analytics leaders are proving to …

The key to success with prevention strategies like remote browser isolation
It is tempting as a security practitioner to think you can prevent every attack. Especially in a people-strapped industry, why wouldn’t you want to? If we could just use …

The next step in network security evolution
In 1987, Bernd Fix developed a method to neutralize the Vienna virus, becoming the first known antivirus software developer. In 2017, as we pass the 30-year anniversary, a lot …

Ransomware’s lucrative next stop? The Point of Sale
With the influx of credit card breaches over the past few years at major brands, hackers may have reached a point of supply exceeding demand, as awareness of breaches, …

To protect your network, you must first know your network
A sobering statistic regarding commonly used security controls was highlighted in a recent report. “Software and hardware inventory and valuation” was the least …

How organizations across industries create and manage policies
MetricStream evaluated 260+ organizations across 15 industries to understand the ways in which organizations create, manage, and communicate policies, the challenges they …

Richard Ford: A physicist’s strange journey to become an infosec scientist
Many of today’s information security professionals started their path towards a career in the industry by becoming frustrated gamers. Richard Ford, Chief Scientist at …

The evil of vanity metrics
With the fast-paced evolution of tools and connectedness in business operations, the amount of network and log data has exploded. However, organizations have largely failed to …

Cut the FUD: Why Fear, Uncertainty and Doubt is harming the security industry
Although the acronym is close to a century old, FUD (Fear, Uncertainty and Doubt) has come to be closely associated with the technology industry since the 1970s. FUD is a …

10 tips to optimize security during the holidays
Optiv Security shared its annual list of tips to help organizations get the most from their security programs during the busy holiday season. A team of security experts …

Infosec expert viewpoint: DevOps security
A Ponemon Institute survey of nearly 1,250 global public sector IT decision makers and managers revealed that public sector organizations undergoing digital transformation are …