New & Notable
Cybersecurity strategy News
October 22, 2021
A federal data privacy law would provide crucial safety guidance for development and adoption of technologies like augmented and virtual reality, according to Rep. Suzan DelBene.
September 30, 2021
The EU-U.S. Trade and Technology Council plans to develop standards, address supply chain issues and define approaches to data governance, but the road ahead could be a bumpy one.
September 10, 2021
As China's crackdown on businesses sounds alarm bells for C-suite executives, a U.S. district judge handed down a long-awaited verdict in the Apple vs. Epic Games trial.
August 31, 2021
With new data privacy regulations like China's personal data protection law coming down the pike, CIOs need to make privacy and security the central focus of their overall IT strategies.
Cybersecurity strategy Get Started
Bring yourself up to speed with our introductory content
Air gaps can be a valuable last line of defense against ransomware. However, both logical and physical air gaps have vulnerabilities that can be exploited by bad actors. Continue Reading
Cookie poisoning is a type of cyber attack in which a bad actor hijacks, forges, alters or manipulates a cookie to gain unauthorized access to a user's account, open a new account in the user's name or steal the user's information for purposes such ... Continue Reading
Footprinting is an ethical hacking technique used to gather as much data as possible about a specific targeted computer system, an infrastructure and networks to identify opportunities to penetrate them. Continue Reading
Evaluate Cybersecurity strategy Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
The CIO is critical for ensuring strong cybersecurity within the organization. Learn why the CIO's role inherently makes that difficult, and how to overcome obstacles. Continue Reading
Organizations in every industry can be targets of cybercrime for profit. Get expert advice on ransomware prevention, detection and recovery in our comprehensive guide. Continue Reading
As employees continue working remotely, the prevalence of shadow IT grows. This inevitability is forcing IT leaders to weigh the pros and cons of unsanctioned technology use. Continue Reading
Manage Cybersecurity strategy
Learn to apply best practices and optimize your operations.
As the advent of cloud technology has made it easier to launch shadow IT, CIOs must be increasingly diligent to identify and manage these activities. Here are 14 tips to do just that. Continue Reading
As enterprises rework post-pandemic business models at unprecedented speeds, failure to mitigate risks due to governance, transparency and cultural issues is costly but avoidable. Continue Reading
Several emerging trends are reshaping the risk management landscape, including GRC platforms, maturity frameworks, risk appetite statements, CIO roles and ERM's competitive advantage. Continue Reading
Problem Solve Cybersecurity strategy Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
With SBOMs, companies will know what components constitute the software they purchase, making it easier for security teams to understand and manage vulnerabilities and risks. Continue Reading
When employees use unapproved devices and software, they create information security vulnerabilities. Here's a look at some of those risks and how IT can prevent them. Continue Reading
A ransomware incident response plan may be the difference between surviving an attack and shuttering operations. Read key planning steps, and download a free template to get started. Continue Reading