The People, Process and Technology You Need to Implement an Advanced PAM Program
Written for CISOs, IT operations, and cyber security professionals, this eBook details the right people, processes, and technologies you need to plan and execute an advanced PAM program. Incorporating experience with more than 10,000...
Cybersecurity for Dummies eBook delivers a fast, easy read that describes what everyone needs to know to defend themselves and their organizations against cyber attacks - including simple steps everyone can take to protect themselves at work and at home. It empowers your employees to understand and recognize the most...
At Citi nearly 25 years ago, Steve Katz was named the world's first CISO. Today he remains active in the field and has a unique perspective on how the CISO role has evolved - and what it will take to be a cybersecurity leader in the future.
Security leadership requires far more than knowing about the latest technology, says Joyce Brocaglia, founder of the Executive Women's Forum, who offers insights on how CISOs can enhance their reputations.
The SANS Institute's Cyber Workforce Academy is helping to address the shortage of cybersecurity pros by recruiting individuals from other fields and matching graduates with local employers, says Max Shuftan, who leads the institute's cyber talent division. The approach could serve as a model, he says.
New research highlights key management and communication issues facing those responsible for cyber security, including entrenched perceptions by senior leadership and employees. Nearly 50% of cyber security professionals, for example, believe executive boards see them in just a maintenance role, rather than a source...
Vulnerabilities and network incidents are on the rise. You're racing the clock to patch the riskiest vulnerabilities before attackers exploit them.
Review this report to learn:
Exploiting vulnerabilities from the mind of an attacker
Observed success and probability of an incident to due exploitation
The metrics...
As part of healthcare's digital transformation, payers and providers alike have rolled out patient portals and telemedicine platforms to increase access to care, improve patient participation and decrease healthcare administrative costs.
How secure are these portals? What types of authentication protocols are used to...
Developing an effective, sustainable digital security program is a pressing challenge for organizations of all sizes. CIOs and CISOs are facing an increasingly complex risk and regulatory landscape, coupled with a shortage of skilled, experienced information security (IS) professionals to navigate these evolving...
As part of healthcare's digital transformation, payers and providers alike have rolled out patient portals and telemedicine platforms to increase access to care, improve patient participation and decrease healthcare administrative costs.
How secure are these portals? What types of authentication protocols are used to...
Organizations across all sectors are experiencing the cybersecurity skills gap however, it's not just a skill deficit - it's a capacity gap that is widening, driven mainly by the fact that our networks are becoming more complex.They're more distributed, mobile- and cloud-enabled; therefore, it's becoming more of a...
Nearly one-quarter of the global cybersecurity workforce is now made up of women. But women still face significant compensation and other career challenges, according to a new study. Mary-Jo de Leeuw of (ISC)2 shares analysis.
Faced with the increasing sophistication and maturity of cyber threats, CISOs and security teams need to devise ways to better cope with the high-stress environment, says Webroot's Gary Hayslip,
How are we doing on hiring more women in the technology sector? Ann Sung Ruckstuhl of Unisys says that from a demographic representation standpoint, we should be doing far better because of the demonstrable benefits to the business that women bring.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.