Trump cybersecurity dos and don’ts

President-elect Trump could make strong progress on cybersecurity while adhering to his campaign promises.

12/02/16

Goodbye SIEM, hello SOAPA

SIEM systems are becoming part of a dynamic and evolving security analytics and operations architecture.

11/29/16

Which job-related factors alienate cybersecurity pros?

Cybersecurity professionals become dissatisfied when security is considered an afterthought, their pay isn’t on par with the industry, and they don’t have opportunities for skills development.

11/21/16

Trump remains frighteningly behind in cybersecurity

Limited vision statement, lack of knowledge and bureaucratic intransigence could increase cyber risk after Trump is inaugurated.

11/17/16

Goodbye, NAC. Hello, software-defined perimeter

Like NAC, software-defined perimeter (SDP) is a bit of a niche today. But cloud, IoT and mobility will likely drive massive SDP proliferation over the next few years.

11/15/16

Election data models provide a lesson for cybersecurity

Garbage in, garbage out big data analytics models demonstrate that people are just as important as data sets and algorithms.

11/11/16

The scary state of the cybersecurity profession

Cybersecurity professionals are overworked and stressed out while their skills are languishing—a very troubling situation.

11/09/16

Cybersecurity: A Priority for Next POTUS

Nearly half of cybersecurity professionals believe that cybersecurity should be the top overall priority for the 45th president

11/04/16

Trend Micro’s Enterprise Play

Long known for endpoint security, Trend now offers end-to-end cybersecurity solutions for enterprise organizations

10/31/16

Cybersecurity isn’t always a 'boardroom issue'

More than one quarter of cybersecurity professionals say their CISO’s participation level with the board is inadequate.

10/26/16

Cybersecurity, business and IT relationships

Cybersecurity, business and IT relationships

Working relationships between cybersecurity, business and IT groups are strained and fraught with challenges.

10/24/16

Recruiting and retaining cybersecurity talent

Research shows cybersecurity professionals value competitive compensation, a strong cybersecurity culture and business management commitment to cybersecurity.

10/19/16

Cybersecurity Canon book review: There Will Be Cyberwar

Richard Stiennon’s book There Will Be Cyberwar is a good read for those interested in the intersection of network-centric warfare and security vulnerabilities.

10/17/16

IT attrition could help address the cybersecurity skills shortage

Infrastructure specialists with strong IT skills should be welcomed into the cybersecurity professional community.

10/14/16

The truth about cybersecurity certifications

Beyond the Certified Information Systems Security Professional (CISSP), other certifications are more specialized, esoteric and of marginal value.

10/12/16

The state of cybersecurity professional careers

A new report points to severe skills deficiencies, a lack of career planning, and inadequate training, representing existential cybersecurity risk.

10/06/16

Splunk intent on extending cybersecurity leadership

The Splunk user conference (.Conf2016) highlights a balance between powerful new features and ease-of-use benefits.

09/30/16

Keeping up with incident response

Enterprise organizations are forced to ignore security alerts, live with excess risk, and deal with data breaches reactively when they happen.

09/22/16

SIEM market dynamics in play

Financial churn combined with new requirements are transforming the SIEM market for enterprise organizations.

09/20/16

The era of identity-based applications

Enterprise organizations must elevate identity management beyond IT operations and make it an essential component of business processes and security.

09/15/16

Load More