The Role of the CISO and Information Security in Professional Sports

The implications of information security in professional sports go way beyond X’s and O’s. Still, many organizations lack a CISO to oversee data security.

The post The Role of the CISO and Information Security in Professional Sports appeared first on Security Intelligence.

Continue reading The Role of the CISO and Information Security in Professional Sports

The Role of the CISO for Law Firms

This is the first installment in a four-part series about industry CISOs. Be sure to check back next week for the second chapter. Any effective information security program has a dedicated professional in charge. This person is usually the chief information security officer (CISO). I can’t think of many sectors where having a CISO would […]

The post The Role of the CISO for Law Firms appeared first on Security Intelligence.

Continue reading The Role of the CISO for Law Firms

Dealing With Third-Party Vendor Connections in Your Network

While most third-party vendor connections are harmless and well-intentioned, they can act as footholds for attackers to gain access to your network.

The post Dealing With Third-Party Vendor Connections in Your Network appeared first on Security Intelligence.

Continue reading Dealing With Third-Party Vendor Connections in Your Network

Security Mistakes Executives Make

Executives don’t always know best. Some mistakes executives make include using weak passwords and failing to follow the same rules as IT professionals.

The post Security Mistakes Executives Make appeared first on Security Intelligence.

Continue reading Security Mistakes Executives Make

Why System Administrators Are So Crucial to Security

System administrators are crucial to the health and security of IT environments, yet many get little to no attention until something goes awry.

The post Why System Administrators Are So Crucial to Security appeared first on Security Intelligence.

Continue reading Why System Administrators Are So Crucial to Security

Handling Code of Conduct and Acceptable Computer Usage Violations

Most companies have rules in place for monitoring computer usage violations, but they’re often neither the most practical nor effective systems.

The post Handling Code of Conduct and Acceptable Computer Usage Violations appeared first on Security Intelligence.

Continue reading Handling Code of Conduct and Acceptable Computer Usage Violations