New & Notable
Cybersecurity strategy News
June 26, 2020
Businesses can choose from a growing number of mobile apps and Wi-Fi software to protect workers from COVID-19. But tech won't succeed without top-of-the-line privacy protection.
January 09, 2020
GDPR compliance has put many marketing, sales, e-commerce and customer service teams somewhat in line with the California Consumer Privacy Act. There are some differences, however.
July 16, 2019
Compliance with the SEC's new Inline XBRL requirements will change financial reporting processes. The benefits are there, but not everyone is optimistic about the change.
June 28, 2019
CIO Vince DiMascio describes how investment in RPA is optimizing legal processes and serving as the glue for integrating business systems at Berry Appelman & Leiden.
Cybersecurity strategy Get Started
Bring yourself up to speed with our introductory content
Organizations must assess and prioritize risk management in their IoT investment to ensure their data and information assets are protected without overspending. Continue Reading
To bridge the gap between NetOps and SecOps teams, network pros should know security fundamentals, including different types of attackers, attacks and available security services. Continue Reading
The threat of IoT botnets continues to grow with the number of deployed IoT devices. IT experts must understand and guard against the inherent risk of an expanding attack surface. Continue Reading
Evaluate Cybersecurity strategy Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
The company that controversially scrapes data from social media sites for law enforcement clients announced a data breach. What does it mean for the future of facial recognition? Continue Reading
A constant deluge of data breach disclosures has prompted an increase in cybersecurity insurance coverage adoption. Learn how a policy can enhance an enterprise risk management program. Continue Reading
When trying to maintain balance between security and privacy in an AI-enabled world, who decides which side should tip and when? So continues the security vs. privacy debate. Continue Reading
Manage Cybersecurity strategy
Learn to apply best practices and optimize your operations.
Security vs. usability is always a constant struggle for security teams. The rapid change to remote access during the pandemic has forced companies to revisit their risk management approach. Continue Reading
It pays to expect the unexpected in information security. In this webinar, learn how starting with a blank slate helps identify and mitigate common cybersecurity problems. Continue Reading
Social engineering attacks aren't anything new, but they continue to evolve and be a big problem for many organizations. Here are the various phishing attacks CIOs should expect, from tabnabbing to whale phishing. Continue Reading
Problem Solve Cybersecurity strategy Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Security risks have increased during the pandemic as remote workers try to get things done. Find out how CISOs can better manage by creating a shadow IT policy. Continue Reading
More users are working from home, which makes them tempting targets for malicious actors. Take the time to fortify your environment by deploying Office 365 protections. Continue Reading
With more cyberattacks targeting industrial systems with IIoT, vendors, developers and manufacturers must incorporate ICS security processes before, during and after development. Continue Reading