IT
Building a strong team key for CISOs
April 27 by Beth MaundrillStepping away from a traditional ‘group think’ mindset key to building a great cyber security team
The 4 stages of data lifecycle management (DLM)
August 04 by Elizabeth MixsonA central component of data governance is data lifecycle management (DLM) - the organizational processes used to control data from its creation to destruction. Read on for the goals and 4 stages of DL...
Cyber Security Agility Critical For Business Resilience And Customer Satisfaction
February 15 by Tim WoodsFundamentally, organizations must be able to leverage their cyber security to protect everything. From firewalls and devices (whether at the edge or on-site), to data stored in the cloud and the confi...
Cross-Industry Lessons Learned In IoT Industrial Network Cyber Security
November 04 by Seth AdlerIf everything from a human to a vending machine is technology that can be attacked, the posture of the enterprise has to adapt. Mohamad Mahjoub, CISO, Middle East, Veolia, joined us to discuss IoT & I...
Why IT leaders Should Consider A Zero Trust Network Access Strategy
October 12 by Seth AdlerCompanies are leveraging the explosion of public cloud solutions to optimize business processes and deliver products and services more quickly and at a lower overall cost.
Incident of the Week: Cognizant Attacked By Maze
April 24 by Leah ZitterHackers had likely crawled its network for weeks, if not longer, spreading through the system as they stole data and administrator credentials.
Risk Management Implications From Shadow IT Behavior
April 20 by CSHub.com Editorial StaffThis CS Hub report addresses some of the shadow IT risk management challenges today’s organizations face. It includes references to some, but not all, cyber security solution types that should be incl...
Interview: Christine Vanderpool, CISO, Florida Crystals
April 13 by CSHub.com Editorial StaffChristine was the 2019 Cyber Security Woman Leader of the Year and the 2020 recipient of Global Technology Executives Who Matter Award.
Security Standards For 5G
March 23 by Esther SheinGartner predicts that the 5G enterprise IoT endpoint installed base will more than triple between 2020 and 2021, from 3.5 million units in 2020 to 11.4 million units in 2021. By 2023, the enterprise 5...
Incident of the Week: Virgin Media Exposes Data of 900,000 People
March 20 by Leah ZitterThe company attributed the hacking to a member of staff who had “incorrectly configured” the database, and promised it's building a specific online service which will allow individuals to find out if...
Workforce Well-Being in the World of Cyber
November 06 by Jothi DugarWe must value wellness of the whole human being in any organization, profession, or industry. This article explores the five essential elements of a cyber security employee’s workforce well-being, the...
Successful Cyber Budgets And Risk Reduction With Diverse Stakeholders
September 16 by Jeff OrrSuccessful cyber budgeting involves building relationships with key stakeholders in the organization, understanding common business objectives and demonstrating progress against measurable goals.