Security
GRC and Cyber Security Must Unite
June 08 by Lisa MorganEnterprise risk management helps remove the traditional friction created by siloed functions so the organization can manage risks more effectively. Point-in-time assessments are replaced by data-power...
Compliance, Privacy, Security in a Work From Home (WFH) environment, oh my!
February 22 by Rebecca WynnThe concept of working from home (WFH) is not a new concept. With today's technology, it is relatively easy worldwide to work from anywhere as connecting to the internet isn't a challenge. But trying...
Business Enablement By Way Of The BISO
October 22 by Seth AdlerThe final mile of business enablement is translating a business-inspired budget into a cogent business case. The BISO is a job title, role and function that has been created for and entrusted with she...
Fight Fraud and Financial Crimes With Analytics and Artificial Intelligence
October 19 by Seth AdlerHow is your organization keeping pace and staying ahead of fraud schemes and regulatory mandates to monitor for them? The goal should be to power more effective and efficient fraud and financial cri...
IOTW: Ethical Hackers Discover Several Apple Vulnerabilities—And The Payout May Reach A Half-A-Million Dollars.
October 16 by Seth AdlerEthical hackers recently participated in Apple’s vulnerability bounty program and scored big. Over the span of three months, five hackers, led by 20-year-old Sam Curry, uncovered 55 vulnerabilities. E...
Security In Motion
October 07 by Seth AdlerSecurity In Motion, December 2, 2020 is an interactive virtual event showcasing key practices, case studies and policies on protecting data accessed from modern endpoints, outpacing adversaries and ga...
Compliance vs. Security
September 02 by Seth AdlerThe CISO role is tasked with balancing compliance directives with security objectives. Thus, we turned to the CSHub community to calibrate the scale that measures that balance.
How To Secure The Distributed Digital Enterprise On Any Endpoint, Anywhere.
August 14 by Seth AdlerExamine a self-contained platform that continuously protects your organisation from evolving cyber threats. Realise secure access to any application, device and files from anywhere without the need fo...
Engaging In A Paradigm Shift On The Definition Of Secure [WATCH On Demand]
July 15 by Seth AdlerLessons have been learned in dynamic shifting of resources. As we move from cloud migration to cloud evolution, Jeff has everyone in the organization focused on a constantly forward thinking cyber sec...
Identity Access, Endpoint Security & User Productivity
June 25 by Seth AdlerNo matter where you currently are on the “return” continuum, some form of accentuated remote work, it seems- it’s here to stay. The days of 30%ish of your workforce remotely accessing your systems som...
Cyber Security Budget Shift Happens: What Action Can A CISO Take?
June 23 by Seth AdlerThe dollar cost of a breach, plus the future IP cost of that breach, plus the cost to the perception of the brand when the breach hits the headlines- explain all of that. Then ask- is it worth saving...
Enable Secure Business With A Zero Trust Strategy [WATCH]
May 12 by Seth AdlerGlobal corporate enterprise executives of all levels now expect to be able to access applications anywhere and anytime, with a similar and easy user experience regardless of location or device they ar...