By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Enterprise information security management News
August 25, 2017
With cyberattacks increasing in sophistication and data privacy laws such as the European General Data Protection Regulation set to go into effect in 2018, organizations should expect to see ...
August 18, 2017
How do you make developers, who sometimes operate at breakneck speeds, care about security? Why not gamify it, Lev Lesokhin of CAST said in this SearchCIO video interview.
July 31, 2017
Lev Lesokhin encourages CIOs to shift cyber security efforts left -- to the development process. He explains what he means in this SearchCIO video interview.
June 30, 2017
Just as a healthy body can't dodge every bacterial infection that comes its way, so should a sound organization realize it cannot avoid getting hacked. That's how Michael Chertoff, former secretary ...
Enterprise information security management Get Started
Bring yourself up to speed with our introductory content
With years of cybersecurity and military IT experience, the District of Columbia's first information security officer brings a well-developed toolkit to the job. Continue Reading
Cognitive security is the application of AI technologies patterned on human thought processes to detect threats and protect physical and digital systems. Continue Reading
Distributed ledger technology (DLT) is a digital system for recording the transaction of assets in which the transactions and their details are recorded in multiple places at the same time. Continue Reading
Evaluate Enterprise information security management Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Shadow IT risk continues to plague companies, but some are finding ways to allow citizen developers to use these unsanctioned applications -- with certain restrictions. Continue Reading
Jason Hong talks about Carnegie Mellon's work in social cybersecurity, a new discipline that uses techniques from social psychology to improve our ability to be secure online. Continue Reading
In this video, David Bianco, technology advisor at Sqrrl, describes the key objectives of the emerging threat hunter role in enterprise cybersecurity organizations. Continue Reading
Manage Enterprise information security management
Learn to apply best practices and optimize your operations.
The CEO of a global pen tester used to work for the New York Yankees. Find out how Jennifer Steffens went from sports marketing to head of a security service provider. Continue Reading
A vast majority of APT attacks and malware delivery happens via spear phishing. But worms have always had a place in the toolkit when the delivery method fit the mission. Continue Reading
Security is a hot topic for media outlets that report on stock markets as companies founder on corporate earnings. The financial fallout of global malware is a call to action. Continue Reading
Problem Solve Enterprise information security management Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Should products intercept Transport Layer Security connections to gain visibility into network traffic? A new study by researchers and U.S.-CERT warn against it. Continue Reading
A recent article on biological malware got Niel Nickolaisen thinking about how to minimize security risks in emerging tech. Here are two approaches that will help. Continue Reading
Companies are in hot pursuit of the benefits offered by cutting-edge technologies, but mitigating security risks often gets scant attention. CIOs need to change that. Here's how. Continue Reading