The traditional network perimeter is a thing of the past. Today, anywhere-anytime access to information is the expectation; striking a balance between security and accessibility is the challenge.
Regular auditing helps contribute towards a more secure IT environment.
Entrepreneurs must strike a balance between innovation and cyber risk management.
What the world needs to improve in network security is to reverse the natural sequence of TCP/IP.
Before heading off on summer vacation, IT workers “feel the heat” of just how valuable their services are, especially because within many companies, this department is traditionally understaffed and security resources are often constrained.
The explosive growth of mission-critical enterprise and cloud data repositories has made the need to review and upgrade cyber defenses one of the IT community’s highest priorities.
by Eyal Benishti We all believe that we’re the weakest link. As we’ve come up through the ranks in IT, we were trained to believe that technology is the answer, that technology is the safety net “for human stupidity.” In March 2011, the giant security company RSA was hacked. A spear-phishing e-mail was sent to two small groups within the company. Though the e-mail was automatically marked as junk, the […]
by Ryan Stolte Cyber risk management should be like a democracy where many individuals contribute to the effort. Yet, many large companies today expect their CISOs and their security team to do it all, a task that one team cannot achieve alone. Today’s complex enterprise environment consists of thousands of applications and systems, some of which hold the company’s most valuable information, and are governed by line-of-business and application owners […]
by Paul LaPorte The healthcare industry faces special challenges when it comes to safeguarding personal health information (PHI). Patients provide a wide range of private, identifying details in relation to their medical records that go beyond just their names and contact information. Patient records may contain detailed demographic data like social security numbers; sensitive information about medical conditions, medical history, and test results to determine appropriate care; and financial or insurance […]