New & Notable
Cybersecurity strategy News
September 10, 2021
As China's crackdown on businesses sounds alarm bells for C-suite executives, a U.S. district judge handed down a long-awaited verdict in the Apple vs. Epic Games trial.
August 31, 2021
With new data privacy regulations like China's personal data protection law coming down the pike, CIOs need to make privacy and security the central focus of their overall IT strategies.
August 13, 2021
Apple is launching features to detect child abuse images in photos and messages. But data privacy experts have some concerns about how else the technology might be used.
June 14, 2021
Data privacy laws are becoming part of a 'modern economy,' according to Google's Kate Charlet, director for data governance.
Cybersecurity strategy Get Started
Bring yourself up to speed with our introductory content
A risk management specialist is a role appointed within organizations to identify potential risks that might negatively affect the business. Continue Reading
A Chief Security Officer (CSO) is a C-suite executive responsible for a company's physical and digital security. Continue Reading
A shadow password file, also known as /etc/shadow, is a system file in Linux that stores encrypted user passwords and is accessible only to the root user, preventing unauthorized users or malicious actors from breaking into the system. Continue Reading
Evaluate Cybersecurity strategy Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
It's not a question of whether a company will fall prey to ransomware, but when. Executives should focus on deciding to pay or not pay the ransom and on any legal fallout. Continue Reading
Forward-thinking companies are hiring privacy engineers. Could your organization benefit? Uncover how these experts promote innovation and fortify customer trust. Continue Reading
Companies are struggling to identify the cybersecurity technology that would actually be useful for their use cases. It's time for a new market model around efficacy instead. Continue Reading
Manage Cybersecurity strategy
Learn to apply best practices and optimize your operations.
Adequacy audits are conducted to assess the efficacy of IT system controls and identify areas for performance or other improvements. Use this audit checklist to get started. Continue Reading
The digital transformation disrupted the relationship between brand value and risk. Vishal Salvi explains how the right cybersecurity strategy protects both brands and customers. Continue Reading
Roota Almeida, CISO at Delta Dental of New Jersey and Delta Dental of Connecticut, talks about the cybersecurity threats she's seen over the last year and how she's effectively managing her security team. Continue Reading
Problem Solve Cybersecurity strategy Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Ransomware can cost companies billions in damage. Incorporate these ransomware prevention best practices to keep attackers out. Continue Reading
It's not enough to protect a company's system from ransomware. Reduce damage from attacks with these three ransomware detection methods. Continue Reading
As bitcoin use increases, so too have the number of cyber attacks on cryptocurrency exchanges and wallets. Learn how to keep bitcoin use secure. Continue Reading