Budgets

Ffc4103a877b409fd8d6da8f854f617e

Cloud Security Alliance Shares Security Guidance for Crypto-Assets Exchange

April 13, 2021 Added by:InfosecIsland News

The Cloud Security Alliance (CSA) has released new Crypto-Asset Exchange Security Guidelines, a set of guidelines and best practices for crypto-asset exchange (CaE) security.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

Intel Corp. to Speak at SecurityWeek Supply Chain Security Summit

March 08, 2021 Added by:InfosecIsland News

Join Intel on Wednesday, March 10, at SecurityWeek’s Supply Chain Security Summit, where industry leaders will examine the current state of supply chain attacks. Hear Intel’s experts discuss the need for transparency and integrity across the complete product lifecycle, from build to retire.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

GitHub Hires Former Cisco Executive Mike Hanley as Chief Security Officer

February 24, 2021 Added by:InfosecIsland News

Software development platform GitHub announced on Wednesday that it has hired Mike Hanley as its new Chief Security Officer (CSO).

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

Reddit Names Allison Miller as Chief Information Security Officer (CISO)

February 22, 2021 Added by:InfosecIsland News

Social news community site Reddit announced has hired Allison Miller as Chief Information Security Officer (CISO) and VP of Trust.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

SecurityWeek Names Ryan Naraine as Editor-at-Large

January 18, 2021 Added by:InfosecIsland News

SecurityWeek has named Ryan Naraine as Editor-at-Large, adding a veteran cybersecurity journalist and podcaster to its editorial team.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Edge Computing Set to Push Security to the Brink

June 13, 2020 Added by:Steve Durbin

In the coming years, poor implementation of edge computing solutions will leave organizations open to attack.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Securing the Internet of Things (IoT) in Today's Connected Society

November 19, 2019 Added by:Steve Durbin

The rush to adoption has highlighted serious deficiencies in both the security design of Internet of Things (IoT) devices and their implementation.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Human-Centered Security: What It Means for Your Organization

September 24, 2019 Added by:Steve Durbin

Human-centred security acknowledges that employees interact with technology, controls and data across a series of touchpoints throughout any given day.

Comments  (0)

239132446c9379ed143375ff11db6a65

Three Strategies to Avoid Becoming the Next Capital One

August 30, 2019 Added by:George Gerchow

Three strategies to preventing catastrophic cloud security issues.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Why a Business-Focused Approach to Security Assurance Should Be an Ongoing Investment

August 29, 2019 Added by:Steve Durbin

Security assurance should provide relevant stakeholders with a clear, objective picture of the effectiveness of information security controls.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

New Year’s Resolution for 2019: Cybersecurity Must Be the Top Priority for the Board

January 04, 2019 Added by:Steve Durbin

Four security topics businesses should focus on in 2019.

Comments  (0)

4238fc46fe869de66700ec14d6738248

Securing the BYoD Workplace

November 28, 2018 Added by:Scott Gordon

A secure organization rises to meet the challenges posed by BYoD instead of letting them fly overhead.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

A Human-Centered Approach to Building a Smart, Satisfied Information Security Team

November 15, 2018 Added by:Steve Durbin

Building tomorrow’s security workforce is essential to address shortfalls in skills and capabilities and to deliver robust and long-term security for organizations in the digital age.

Comments  (0)

760f8b3ac86e3ac286c6e0d4bdd9a039

Lessons from Cyber Essentials – Going Back to the Basics

October 11, 2018 Added by:Andrew Avanessian

IT leaders across all organisations should be working to weave in the Cyber Essentials scheme into the fabric of their businesses.

Comments  (0)

0fd0758565844dd411fbfb4600a7b981

Could a Credit-Like Security Score Save the Cyber Insurance Industry?

October 11, 2018 Added by:Joseph Kucic

Enterprises need access to cyber insurance that accurately reflects their current security posture and that covers both direct and indirect expenses.

Comments  (0)

Ac61693522e1c081485f696ae6a5fb4b

The Importance and Requirements of Privileged Access Management

August 30, 2018 Added by:Joseph Carson

The growing need to secure the “keys to the kingdom” and the steps organizations need to take to protect their critical credentials.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »
Most Liked