What trends do security pros have their eyes on? Their answers run the gamut from tools and technologies to threats, tactics, and training. Read More ▶ | | | White Paper: Okta When it comes to phishing, knowledge is power. We tend to underestimate the impact of phishing on the enterprise and assume our existing defense strategies are sufficient to combat these attacks. Read More ▶ | Digital transformation is front of mind for many senior executives, but too often security is left behind. Read More ▶ | | Learn the best practices for integrating identity management into your business while also staying ahead of cutting edge competition. Read More ▶ | | | Security executives are taking a hands-on approach in areas such as threat intelligence, privacy, and business initiatives. Read More ▶ | | Choose a security event information management (SEIM) vendor that helps you focus on only the security event data that needs to be investigated. Read More ▶ | | Healthcare continues to be a popular target for ransomware, cryptomining, data theft, phishing, and insider threats. Read More ▶ | | A number of data center administrators from large financial, health care and retail corporations have begun to regard the current draft of the 1.3 version of the TLS protocol with increasing alarm. The issue comes down the tussle between security and visibility. Read More ▶ | | Video/Webcast: PagerDuty A recent Threat Stack survey finds that over 50% of companies admit to cutting back on security measures to meet a business deadline or objective. As long as companies are willing to sacrifice security at the altar of speed, the long-held dream of marrying DevOps and security simply won't come true. Read More ▶ | CSO Insider | Editor's Picks | | | |
0 comments:
Post a Comment