If your remit protects the information technology estate, you might be tired of the constant fire drills and reminders of upcoming disruptions. The barrage from cybersecurity vendors claiming “we have…
Browsing CategorySecurity Solutions
‘Inbox Zero’ Your Threat Reports: How to Combat Security Alert Fatigue
At best, a new cybersecurity alert should trigger immediate action. But we all know in practice that work is not always clear cut. A new alert can find itself as…
How Enterprise Design Thinking Can Improve Data Security Solutions
“Design must reflect the practical and aesthetic in business, but above all … good design must primarily serve people,” said Thomas J. Watson, a man synonymous with IBM. To no…
A Threat Intelligence Strategy Map: Connecting Technical Activities to Business Value
You’re trying to make the business case for your organization’s threat intelligence initiative, but members of the senior leadership team remain puzzled about the value of their investments in cybersecurity.…
How to Make Cryptography Services Work for Your Organization
For companies moving to public or even multicloud environments, key management and encryption — of data in motion, at rest and even in use — are top of mind. Organizations…
11 Stats on CISO Spending to Inform Your 2020 Cybersecurity Budget
The global average cost of a data breach is now $3.92 million — a 12 percent increase since 2014. Fortunately, the average cybersecurity budget is also increasing alongside breach cleanup…
6 Steps to Modernize Your On-Premises Identity and Access Management Architecture
The time has come to modernize your on-premises identity and access management (IAM) system. As organizations of all sizes and across industries move data and applications to the cloud, some…
How to Select the Right IDaaS Vendor and Avoid Deployment Pain Points
Since the advent of the cloud, the number of -as-a-service solution offerings has exploded. But most businesses continue to operate with a mix of on-premises and cloud applications that need…
Blockchain Transactions, RFID and More: 7 Security Tips to Help Regulate the Cadaver Trade
While sitting in metaphysics class one afternoon, I asked my philosophy professor if Frankenstein’s monster is really a monster if he is just the sum of other people’s parts. He…
Can Fraud Detection Solutions Deliver the Authentication, Risk and Compliance Tools Banks and Insurers Need?
Change is afoot in how organizations serving customers online can deliver fraud detection and improve the customer experience. The disruption is happening in every sector, especially banking and insurance. Growing…