RiskIQ surveyed 1,691 security leaders from multiple verticals in the U.S. and U.K. about the current digital threat landscape. The results show that relentless, Internet-scale threat campaigns are near-universal pain points – and CISOs are afraid that their security teams are ill-equipped to stop them.
The scariest attacks of 2017 don’t have a name. They are not featured in the headlines. They are the unreported and the under-reported. The cyber criminals are not undefeatable supernatural, evil entities.
When it comes to the Internet of Things, it’s easy to identify the breadth and depth of the potential value of these connected things. It’s not so easy identifying the threats, risks, and related management solutions. Expert Chuck Brooks gives us his view into how to get a handle on these challenges.
When technology evolves faster than our ability to make sure there's a viable level of safety, how do we educate businesses and the layperson on best practices for IoT security? In this part 2 InfoSec Life article, Phil Agcaoili, CISO, shares his views on the need to raise InfoSec awareness in society while striving for (and embracing) diversity in cybersecurity.
Is cybersecurity insurance a necessary evil? Assuming it is, how can organizations make the most of their audit and compliance efforts to get the best coverage and rates possible? Expert Alan Zeichick speaks with experts from multiple angles to see how best to streamline the application process.
ISSA-LA presents two women in security and technology panels. The first panel explores information security, IT and other technology-oriented positions as they relate to attracting, recruiting, and maintaining diverse talent. And the second panel focuses on a different kind of inclusion: security versus privacy in the cybersecurity space.
Elena Elkina believes that even the most experienced and confident professional can use good career advice, and there’s no better way than through mentoring. Whether it is formalized or non-traditional mentorship, Elena provides a guide to looking for a mentor and reminds us that when you give, you get.
Mr. Shrobe recently published an article stating that formal education is the only way out of our cybersecurity hellhole. In response, Keirsten Brager wrote some alternative viewpoints from the perspective of a practitioner and a student of the discipline.
Your nature makes you a perfect candidate for a career in InfoSec, but it’s the nurturing found in community that will make you a success.
When it comes to ingesting, digesting, and applying threat intelligence in a meaningful way, it can seem like information overload. With their Threat Catalogue, HITRUST is helping the healthcare industry overcome this challenge with a complete list of security and privacy threats geared toward the threats the industry faces on a daily basis.
Learn how a powerful sense of mission can provide motivation to solve complex problems and meaning in the InfoSec life from ADP SVP/CSO Roland Cloutier.
Expert analysis by Candy Alexander of a recent study from ISSA and ESG emphasizes the need for more formal planning in career advancement in cybersecurity.
Putting together a cybersecurity workforce is similar to assembling a Super Hero Dream Team, explains Gene Fredriksen, CISO for PSCU, which services more than 800 credit unions. In this An InfoSec Life piece, Gene explains how he harks back to his love for superhero comic books in coming up with his cybersecurity dream team.
How did the role of CISO begin? How did it progress? What does the future hold for this critically-important executive role? Information security thought leader, Demetrios Lazarikos (Laz) gives us an overview of the past and provides a sneak peek into the future of the CISO.
How does the CSO of MasterCard stay ahead of the bad guys? By empathizing with consumers who use its card, incentivizing employees to recognize potential emailed hazards, and evangelizing cybersecurity to young talent as a rewarding career.
Do you have what it takes to win the war on cybercrime? In this Experts Corner, Ajit Sancheti outlines three moves enterprise organizations can take to position themselves for the worst. It's your move.
When thinking about the elements of a village, you may think about people, homes, transportation and commerce. However, there’s another critical component that sits passively in the backdrop yet plays a very frontal role. In this Experts Corner, Ryan Stolte connects the town square to the business bringing together people, process, and technology to reduce cyber risk.