Make vs. Buy: The CISO's Guide to Evaluating Managed Security Services
Some important considerations for CISOs faced with the decision of whether to tackle security initiatives in-house or outsource to a managed security service provider.
Some important considerations for CISOs faced with the decision of whether to tackle security initiatives in-house or outsource to a managed security service provider.
Most businesses today are well aware of the need to have a comprehensive data security strategy to protect themselves, their employees and their customers from various security threats.
How did hackers manage to extract terabytes of data from the network of Sony Pictures without direct, physical access? It may have been easier than you would think.
Endpoint Detection and Response defined in Data Protection 101, our series on the fundamentals of data security.
Security luminary Dan Geer shares his thoughts on the need for collaboration in security.
Have you wondered why these attacks keep happening? Maybe you have a theory? Here are some ideas.
Endpoint security defined in Data Protection 101, our series on the fundamentals of information security, data loss prevention, and more.
Forrester's report on data discovery & classification has several key takeaways for any data loss prevention program. I'd like to share my personal favorites.
Paying tribute to the infosec pioneer behind the reference monitor concept
Educating end users is a process, not an event