

Ryan Francis
Contributor
Ryan Francis has been in the tech publishing field for 17 years.

Outsourcing security: Would you turn over the keys to a third party?
Years ago it would have been unthinkable to give up control to securing your most valuable assets. But for some companies the risk of handing the security keys to a third party is less than the idea of facing the daily barrage of...

How CISOs can answer difficult questions from CEOs
A hypothetical conversation can become all too real, and hopefully you are prepared with the answers. Here is a script to help get you started.

Q&A Citrix CSO: How to deal with security across multiple generations of employees
Citrix’s CSO Stan Black has been in the cybersecurity field for 20 years. He talks about how security has changed among employees in each generation.

Top DRaaS companies to watch
Forrester Research recently released its report naming Sungard AS, Bluelock, IBM, and iland as the top disaster recovery-as-a-service companies. See its reasoning why.

Vendors approve of NIST password draft
The draft guidelines revise password security recommendations and altering many of the standards and best practices security professionals use when forming policies for their companies.

Computer forensics follows the bread crumbs left by perpetrators
As investigators, these security pros let the clues lead them. See in a few examples how commercial software helps these techies solve the crime.

Third parties leave your network open to attacks
With the Target example as the high-water mark, enterprises need to worry about the lack of security on a third parties’ part. How do you tighten things up?

False positives still cause threat alert fatigue
How you set up and prioritize which alerts to look at and act on is the basis for an effective threat management strategy.

Believe your employer doesn’t know about your legal problems? Think again
Companies hire a third party to scour public databases to make sure employees are not getting into legal trouble that would impact their jobs. But is it ethical? Experts explain.

Users have little confidence their company can protect their mobile device
A survey sponsored by Check Point found that 64 percent of respondents are doubtful that their organization can prevent a mobile cyberattack. What can be done to combat that?

Healthcare records for sale on Dark Web
A clinic in Baltimore is just one example of a healthcare provider having its records stolen, only to find them on the Dark Web for less than one cent per record.
-
White Paper
-
eBook
Sponsored -
White Paper
-
eBook
Sponsored -
White Paper