automation

Automation Is The Core Of Data Protection

For organizations, the average total cost of a data breach is over $3 million. For employees or customers, the cost is a loss of privacy, identity theft, and immediate or future monetary loss. Here's why automation is the core of data protection and why it should be a business priority this year.

3 Signs Your Website Security Strategy Is in Need of a Refresh

The threat of cybercrime continues to grow, and small and medium-sized businesses (SMBs) should be especially concerned as they lack the IT budget and resources that larger enterprises have and are thus more likely to struggle after suffering a breach. For those guilty of letting their website security strategies sit on the back burner, SiteLock president Neill Feather suggests that it may be time to consider a strategy refresh.

New SOC Strategies For Our Modern InfoSec Landscape

With the proliferation of attack types and the reality that threat actors are getting smarter, faster, and more efficient at compromising networks, today’s Security Operation Centers (SOC) must be more flexible and agile to detect and stop threats.

Citizen Development - It’s Everywhere, Unstoppable, And Good - Part II

Software tools that empower employees to create and automate workflows should be easy to use. Plain and simple: They are not programming utilities. And they should not look like programming utilities.

Citizen Development - It’s Everywhere, Unstoppable, and Good

Citizen development – when non-programmers create useful software solutions – is excellent for driving business productivity.It lets employees that own business problems to own – and build – business solutions. Unlike with software written by a company’s IT developers or outside contractors, citizen development involves a minimum of red tape and funding, gets directly to the heart of what the employee was trying to accomplish, and can make lots of people happy. If it’s done right.

Grant Access to Workflows, Not to Systems or Data

It happens all the time: Employees, departments or even third-party entities request access to business applications so they can perform important tasks. How much access should they be granted - and to which systems and data. Expert Mike Fitzmaurice sheds some light on enterprise application workflow best practices.

Stuck in Cybersecurity Hell? Here Are 5 Other Possible Ways Out of It

Mr. Shrobe recently published an article stating that formal education is the only way out of our cybersecurity hellhole. In response, Keirsten Brager wrote some alternative viewpoints from the perspective of a practitioner and a student of the discipline.