Celebrating the Progress of National Cyber Security Awareness Month

October is National Cyber Security Awareness Month, an initiative started in 2004 to educate citizens and businesses about the importance of cybersecurity.

The post Celebrating the Progress of National Cyber Security Awareness Month appeared first on Security Intelligence.

Continue reading Celebrating the Progress of National Cyber Security Awareness Month

The Clinton Security Platform: Addressing the Future of Tech

The Clinton security platform may be light on cybersecurity, but the presidential candidate has a lot to say about the future of technology and innovation.

The post The Clinton Security Platform: Addressing the Future of Tech appeared first on Security Intelligence.

Continue reading The Clinton Security Platform: Addressing the Future of Tech

The Clinton Security Platform: Addressing the Future of Tech

The Clinton security platform may be light on cybersecurity, but the presidential candidate has a lot to say about the future of technology and innovation.

The post The Clinton Security Platform: Addressing the Future of Tech appeared first on Security Intelligence.

Continue reading The Clinton Security Platform: Addressing the Future of Tech

The Information Security Leader, Part 4: Three Persistent Challenges for CISOs

Today’s business climate presents challenges for CISOs regarding the definition of risk, uncertainties of measuring risk and effective communication.

The post The Information Security Leader, Part 4: Three Persistent Challenges for CISOs appeared first on Security Intelligence.

Continue reading The Information Security Leader, Part 4: Three Persistent Challenges for CISOs

The Information Security Leader, Part 3: Four Fundamental Questions for Risk Analysis

When it comes to a risk analysis, CISOs need to translate the question “How secure are we?” into one of the four fundamental questions about risk.

The post The Information Security Leader, Part 3: Four Fundamental Questions for Risk Analysis appeared first on Security Intelligence.

Continue reading The Information Security Leader, Part 3: Four Fundamental Questions for Risk Analysis

The Information Security Leader, Part 2: Two Distinct Roles of a CISO

Information security leaders today must be able to fill the two distinct roles of a CISO: the subject-matter expert and the trusted business adviser.

The post The Information Security Leader, Part 2: Two Distinct Roles of a CISO appeared first on Security Intelligence.

Continue reading The Information Security Leader, Part 2: Two Distinct Roles of a CISO

The Information Security Leader, Part 1: Two Distinct Roles, Four Fundamental Questions and Three Persistent Challenges

An information security leader today needs to fill multiple roles and be capable of addressing new challenges related to managing risk.

The post The Information Security Leader, Part 1: Two Distinct Roles, Four Fundamental Questions and Three Persistent Challenges appeared first on Security Intelligence.

Continue reading The Information Security Leader, Part 1: Two Distinct Roles, Four Fundamental Questions and Three Persistent Challenges

The Information Security Leader, Part 1: Two Distinct Roles, Four Fundamental Questions and Three Persistent Challenges

An information security leader today needs to fill multiple roles and be capable of addressing new challenges related to managing risk.

The post The Information Security Leader, Part 1: Two Distinct Roles, Four Fundamental Questions and Three Persistent Challenges appeared first on Security Intelligence.

Continue reading The Information Security Leader, Part 1: Two Distinct Roles, Four Fundamental Questions and Three Persistent Challenges

Health Care Security: Midyear Checkup on Security Trends

Predictions for health care security in 2016 were grim. What can we learn about the industry and its risks at this midyear checkup?

The post Health Care Security: Midyear Checkup on Security Trends appeared first on Security Intelligence.

Continue reading Health Care Security: Midyear Checkup on Security Trends