Blog Posts Tagged with "cybersecurity"

E54bce6ca0fef52e62d84b5ccedb4428

The Cyber Car: The Intimate Tango of the 21st Century

May 25, 2017 Added by:Asaf Atzmon

The automotive industry is now at a point of no return. Cyber is here to stay and the industry is very well aware of the vulnerability of connected cars.

Comments  (0)

2419b9dc2aa15bd1efadeed440a28aad

Reducing Identity-related Risks: The Complete Package or a One-Man Show?

May 24, 2017 Added by:Jackson Shaw

Cybersecurity professionals are increasingly buckling down on identity and access management (IAM) to protect their critical data assets.

Comments  (0)

A5f2aa8b34c3021fca4738cd12cbd323

We Can’t Control Devices and People, but We Can Control the Network

April 26, 2017 Added by:Dennis Reilly

Dennis Reilly asks BAI Senior Director of Operations Ryan Morris about current trends he is seeing, including what challenges federal agencies may face.

Comments  (0)

8a958994958cdf24f0dc051edfe29462

Cybersecurity Industry Must Adopt Cyberdefense Tech that Utilizes Analytics, Artificial Intelligence

April 06, 2017 Added by:Larry Karisny

The cyberdefense industry needs to quit playing catch-up and having a reactionary approach to cybersecurity.

Comments  (0)

1743acee38ef6b8f211a139c25876919

Stop Doing Four Things—and Convince Your Execs and Board to Properly Fund Cybersecurity

March 28, 2017 Added by:Kevin Magee

If you want to convince your execs and board to properly fund cybersecurity, stop telling them scary stories and using Hollywood clichés to make your case.

Comments  (0)

D8b99a423ff6dd0a2b3436ad64038f7a

Why Simply Increasing Cybersecurity Staffing Won’t Resolve All of Today’s Issues

January 12, 2017 Added by:Nathan Wenzler

Any security program can benefit immediately by reviewing internal policies, improving the metrics used to measure their program's success, and consulting with legal counsel to ensure proper insurances and other risk mitigation plans are in place.

Comments  (0)

F142e224c520497854138dc9fabbac94

Stop Living with FUD: Build Security with Confidence, Assurance and Resiliency

December 23, 2016 Added by:Mike Kail

With expensive cybercrime on the rise, companies across the globe are constantly trying to improve their security stance. As a result, many security vendors have taken advantage of this vulnerability with a FUD approach.

Comments  (0)

76accef69a60a94bb14766fe8bc324ef

The Home of Cyber Security Best Practice: Public or Private Sector?

December 15, 2016 Added by:Bernard Parsons

There are areas where private and public sector can take a leaf out of each other’s books, as the security challenges facing both continue to escalate.

Comments  (0)

Ee5f058b283cdc6dba84464d453801d7

Decrypting the Gender Imbalance: Hiring Women in Cybersecurity

December 09, 2016 Added by:Michelle Johnson Cobb

Organizations that seek to achieve greater representation of women in their IT security teams should maintain a steady, multi-faceted approach to recruitment — and continually evaluate their performance in terms of the advancement and retention of women in this area.

Comments  (0)

8cfea2767deef845d26a5bde4448bf51

Cybersecurity and Donald Trump: Where Do We Go From Here?

December 02, 2016 Added by:Kasey Cross

Changes are most certainly going to be made to cybersecurity. The election itself was tarnished with security issues that created at the very least tension, and at its pinnacle, a kind of hysteria.

Comments  (0)

1fec6881fe864bc30369edb548ea22b1

What Brexit Means for Global Security Professionals

July 27, 2016 Added by:Dan Lohrmann

The bad guys always show up in force with an assortment of phishing schemes in times of confusion like we are seeing today as a result of the Brexit referendum, especially when people break out of normal patterns and click on new content.

Comments  (0)

3ca92d8c88e202c2d9e483c539e0899b

Why Is There a Shortage of Security Talent?

June 03, 2016 Added by:Ajit Sancheti

Embracing new technologies that help intelligently automate parts of security to provide overwhelmed security teams a hand is a start. But in the long run, bigger changes to security strategies will need to take place. Everyone in a company needs to be responsible for security, not just the CISO.

Comments  (0)

C492d23f3758cf5cdee0b35b74cc36f1

How to Calculate ROI and Justify Your Cybersecurity Budget

December 18, 2015 Added by:Ilia Kolochenko

If you speak with management about money – speak their language and you will definitely get what you need.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Managing Security Resources: It’s All About People and Awareness (Part II)

December 07, 2015 Added by:Steve Durbin

As information risks and cyber security threats increase, organizations need to move away from reacting to incidents and toward predicting and preventing them. Developing a robust mechanism to assess and treat information risk throughout the organization is a business essential.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Managing Security Resources: It’s All About People and Awareness (Part I)

December 01, 2015 Added by:Steve Durbin

Organizations worldwide continue to struggle to attract and retain skilled information and cybersecurity professionals. Overcoming this challenge requires a more imaginative, business and people-centric approach to the recruitment of security professionals.

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

Observations From the 2015 ICS Cyber Security Conference

November 10, 2015 Added by:Joe Weiss

2015 ICS Cyber Security Conference – Neither the Grid, Nuclear Plants, or other Undustries are Cyber Secure

Comments  (0)

Page « < 1 - 2 > »