Policy

Ffc4103a877b409fd8d6da8f854f617e

GitHub Hires Former Cisco Executive Mike Hanley as Chief Security Officer

February 24, 2021 Added by:InfosecIsland News

Software development platform GitHub announced on Wednesday that it has hired Mike Hanley as its new Chief Security Officer (CSO).

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

Reddit Names Allison Miller as Chief Information Security Officer (CISO)

February 22, 2021 Added by:InfosecIsland News

Social news community site Reddit announced has hired Allison Miller as Chief Information Security Officer (CISO) and VP of Trust.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

SecurityWeek Names Ryan Naraine as Editor-at-Large

January 18, 2021 Added by:InfosecIsland News

SecurityWeek has named Ryan Naraine as Editor-at-Large, adding a veteran cybersecurity journalist and podcaster to its editorial team.

Comments  (0)

591f195449c4d535c681a49fdf35ace0

United States Federal Government’s Shift to Identity-Centric Security

December 17, 2020 Added by:Frank Briguglio

Governments are increasingly facing new legislation, standards, frameworks, and policies to protect critical and sensitive information.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

How Extreme Weather Will Create Chaos on Infrastructure

October 21, 2020 Added by:Steve Durbin

Extreme weather events will soon become more frequent and widespread, devastating areas of the world that typically don’t experience them and amplifying the destruction in areas that do.

Comments  (0)

671084740e306472f992b176b92ad051

COVID-19 Aside, Data Protection Regulations March Ahead: What To Consider

August 26, 2020 Added by:Terry Ray

Despite the COVID-19 pandemic, companies are obligated to comply with many laws governing data security and privacy

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Expect Behavioral Analytics to Trigger a Consumer Backlash

August 10, 2020 Added by:Steve Durbin

The deployment of cameras, sensors and applications in public and private places for behavioral analytics will be followed by consumer and regulatory backlash.

Comments  (0)

259aa33b32fc31717e8a18f2dc9edc19

Ending the Cloud Security Blame Game

July 08, 2020 Added by:Avishai Wool

Security is primarily your responsibility – with help from the cloud provider.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Edge Computing Set to Push Security to the Brink

June 13, 2020 Added by:Steve Durbin

In the coming years, poor implementation of edge computing solutions will leave organizations open to attack.

Comments  (0)

F3bd25e6f3b8f01dc21a92182761fb8a

Benchmarking the State of the CISO in 2020

March 27, 2020 Added by:Marc Wilczek

A run-down of Cisco's 2020 CISO Benchmark Report.

Comments  (0)

7e5878d1746c69c0ac1f9b86dfcc5ed9

When Data Is Currency, Who’s Responsible for Its Security?

February 11, 2020 Added by:Jason Bevis

With recent security incidents, we've caught a glimpse of the role that data enrichment, aggregators and brokers play in security. What type of responsibility do these parties bear in protecting consumer data and privacy?

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Global Security Threats Organizations Must Prepare for in 2020

January 08, 2020 Added by:Steve Durbin

To take advantage of emerging trends in both technology and cyberspace, businesses need to manage risks in ways beyond those traditionally handled by the information security function.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Human-Centered Security: What It Means for Your Organization

September 24, 2019 Added by:Steve Durbin

Human-centred security acknowledges that employees interact with technology, controls and data across a series of touchpoints throughout any given day.

Comments  (0)

239132446c9379ed143375ff11db6a65

Three Strategies to Avoid Becoming the Next Capital One

August 30, 2019 Added by:George Gerchow

Three strategies to preventing catastrophic cloud security issues.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Why a Business-Focused Approach to Security Assurance Should Be an Ongoing Investment

August 29, 2019 Added by:Steve Durbin

Security assurance should provide relevant stakeholders with a clear, objective picture of the effectiveness of information security controls.

Comments  (0)

5864aed0a807a1e29050f9221c6cfa67

Spring Cleaning: Why Companies Must Spring Clean Out Their Social Media Accounts This Season

June 14, 2019 Added by:David Stuart

Tips for cleaning and securing your online data this spring.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »