Shadow IT
Shadow IT Risks CISOs Should Know
August 17 by Lisa MorganThe CISO can't protect that which is unknown. Hence the need for asset management and CASB tools that help explain the actual ecosystem. Advisory firm CEB estimates that 40% of all IT spending occurs...
Comprehensive Security Awareness: An Enterprise-Wide Goal
July 13 by Lisa MorganSecurity training is becoming non-optional for employees because every business can be victimized directly or indirectly via a third party. Below are some of the topics that should be covered as part...
Risk Management Strategy Fundamentals
May 11 by Lisa MorganCyber security is one of many risk functions within an organization, but the various functions may not work together as closely as they should to collectively lower the company's risk profile. Securit...
Business Enablement By Way Of The BISO
October 22 by Seth AdlerThe final mile of business enablement is translating a business-inspired budget into a cogent business case. The BISO is a job title, role and function that has been created for and entrusted with she...
Risk Management Implications From Shadow IT Behavior
April 20 by CSHub.com Editorial StaffThis CS Hub report addresses some of the shadow IT risk management challenges today’s organizations face. It includes references to some, but not all, cyber security solution types that should be incl...
Security Leaders Express Positive Market Sentiment for Enterprise Cyber Security
January 07 by Jeff OrrThis Cyber Security Hub article summarizes the enterprise market sentiment about cyber security, looks into cyber dollar allocations for the New Year and tests a few ways that organizations are winnin...
Public Cloud Platforms – A Honey Pot For Threat Actors
December 25 by Jeff OrrEach of the various cloud types offer enterprise cost benefits, as well as other efficiencies. However, cloud computing drastically widens the attack surface, offering hackers the upper hand in an end...
Enterprise Cyber Security Trends and Predictions 2020
November 27 by Jeff OrrCyber Security Hub presents its annual market report on InfoSec trends and predictions. We compare results to responses of security leaders to see if challenges or focuses have changed or shifted as t...
Interview: Michael Welch, CISO, OSI Group
September 12 by Jeff OrrWhen injuries cut short a career in professional sports, Michael Welch learned programming and took an interest in security firewall design and configuration. Now, more than 20 years later, he is CISO...
Shadow IT Is Putting Your Enterprise Security At Risk
October 12 by Cyber Security Hub EditorThe term may be newer, but the practice has been going on for decades. Shadow IT is the practice of enterprise departments or personnel conducting their own tech initiatives without the knowledge of t...