Top IT Security Bloggers

  • Why You Need to Align Your Cloud Strategy to Business Goals

    Your company has decided to adopt the cloud – or maybe it was among the first ones that decided to rely on virtualized environments before it was even a thing. In either case, cloud security has to be managed. How do you go about that?Before checking out vendor marketing materials in search of the perfect technology solution, let’s step back and think of it from a governance perspective. In an enterprise like yours, there are a number of business functions and departments with various level o...
  • How IT Teams Can More Efficiently Deliver Stakeholder Satisfaction

    Billy Beane was one of the first general managers in the history of Major League Baseball to use data to build out a successful team with a fraction of the budget relative to his peers. Like many IT leaders, he had to do more with less.Now, imagine that you’re responsible for managing a Periodic Table’s worth of processes central to a successful IT shop.You’re overworked, underfunded, and the business doesn’t understand why it should dedicate resources to supporting yet another acronym from...
  • SheLeadsTech Returns to United Nations

    SheLeadsTech was back this week at the United Nations for the 63rd Session of the Commission on the Status of Women to continue the critically important work of empowering women and girls by providing access to social protection and appropriate infrastructure, including technology infrastructure. This annual meeting attracts delegations from each of the UN’s member-states and up to 4,000 civil society representatives. There are a range of events and presentations that take place in parallel...
  • ISACA at RSA 2019: Sharing Research and Spurring Conversations

    The theme of last week’s RSA Conference 2019, “Better,” gave ISACA the opportunity to engage with information and cybersecurity professionals on how we collaboratively move the technology field into a better future.ISACA kicked off RSA with the release of part 1 of the 2019 State of Cybersecurity report, which revealed insights into issues affecting the cybersecurity workforce and the skills that are currently most in demand.ISACA leaders addressed this topic in their panel, “Building—and Ke...
  • ‘Didn’t You Read My Email??’ and Other Security Awareness Fallacies

    I live in Austin, Texas, USA, where the bumper sticker quotient is fairly high, although diminishing with every vehicle that comes here from places like Dallas (no offense, Dallas — I don’t have any bumper stickers on my car either). One of my favorites is, “If you’re not appalled, you’re not paying attention.”I’m sure it was written with politics in mind, but it’s absolutely relevant for cybersecurity, too. Most security professionals — me included — remember a time when we were appalled, cl...
  • GDPR Audits for SMEs Are All About the Language

    It is often said that a good auditor is a good communicator, and this is particularly true when dealing with smaller organizations.Small and medium-sized enterprises (SMEs) tend not to have the capacity to employ specialists in every role, instead relying upon generalists who fulfil many roles in the organization.Unless the SME’s business is data processing or falls into one of the other categories that require a data protection officer (DPO), then the chances are that as auditors we will be...
  • Cybersecurity: A Global Threat That We Can Control

    If there were any question about the critically important role that information and cyber security practitioners play in the welfare of today’s society, there is new evidence spelling it out in stark, attention-grabbing terms.Data fraud/theft and large-scale cyberattacks were each identified among the top five global threats in the latest edition of the World Economic Forum’s Global Risks Report. The other elements on the list: extreme weather events, failure of climate change mitigation and...
  • Artificial Intelligence and Cybersecurity: Attacking and Defending

    Cybersecurity is a manpower-constrained market – therefore, the opportunities for artificial intelligence (AI) automation are vast. Frequently, AI is used to make certain defensive aspects of cybersecurity more wide-reaching and effective. Combating spam and detecting malware are prime examples.On the opposite side, there are many incentives to using AI when attempting to attack vulnerable systems belonging to others. These incentives include the speed of attack, low costs and difficulties at...
  • Paying for Apps with Your Privacy

    Don’t look at your device when I ask you this question: How many apps do you have on your smartphone? Or, if you use your tablet more often, how many apps do you have on your tablet? Remember this number or write it down.OK, now look at your device. How many apps do you actually have installed? Is that number higher than what you wrote down previously?For most people, it would be. In many of my keynotes, and in most of my client key stakeholder meetings, I ask this question. I’ve seen around...
  • Environmental Drift Yields Cybersecurity Ineffectiveness

    Your cybersecurity tools are working, optimized, and providing real, measurable, business value. They are successfully blocking attacks, detecting nefarious activity, and alerting the security team.Then it happens. Somewhere a change is made by someone outside of the security department. That change isn’t communicated to the security team. Now all of a sudden, your cybersecurity tools are becoming ineffective and, worse, financial, brand, and operational risk has been introduced to the organi...

Editor's Recommendations

Solution Centres


View all events Submit your own security event

Latest Videos

More videos

Blog Posts

Media Release

More media release