Are Cybercriminals Winning the Mainframe Security Cat-and-Mouse Game?

The current state of mainframe security often amounts to bringing a knife to a gun fight: The number of available fighters is shrinking as skilled mainframe security practitioners hang up their hats.

The post Are Cybercriminals Winning the Mainframe Security Cat-and-Mouse Game? appeared first on Security Intelligence.

Continue reading Are Cybercriminals Winning the Mainframe Security Cat-and-Mouse Game?

A New Privacy Frontier: Protect Your Organization’s Gold With These 5 Data Risk Management Tips

The enactment of recent privacy mandates is just the start. A comprehensive data risk management program established before more regulations go into effect is well worth its weight in gold.

The post A New Privacy Frontier: Protect Your Organization’s Gold With These 5 Data Risk Management Tips appeared first on Security Intelligence.

Continue reading A New Privacy Frontier: Protect Your Organization’s Gold With These 5 Data Risk Management Tips

Data Risk Management: Circling the Wagons With Three Chief Officers Leading the Way

To establish a consolidated data risk management program, the chief information security officer (CISO), chief data officer (CDO) and chief risk officer (CRO) must be on the same page.

The post Data Risk Management: Circling the Wagons With Three Chief Officers Leading the Way appeared first on Security Intelligence.

Continue reading Data Risk Management: Circling the Wagons With Three Chief Officers Leading the Way

The Wild West of Data Risk Management in the Age of Cloud, Mobile and Digital Transformation

In today’s rapidly evolving security environment, it’s imperative for organizations to establish a formal data risk management program that does more than just check the boxes.

The post The Wild West of Data Risk Management in the Age of Cloud, Mobile and Digital Transformation appeared first on Security Intelligence.

Continue reading The Wild West of Data Risk Management in the Age of Cloud, Mobile and Digital Transformation

The Key to Protecting Your Crown Jewels? Improve Risk Management

Experts at the 2018 RSA Conference demonstrated how increasing collaboration and accountability around cyber risk management is the best way to protect your critical assets.

The post The Key to Protecting Your Crown Jewels? Improve Risk Management appeared first on Security Intelligence.

Continue reading The Key to Protecting Your Crown Jewels? Improve Risk Management

Data Risk Management, Part 3: Assessing Risk Levels of Structured Versus Unstructured Data

To protect their crown jewels from data thieves, organizations must determine the difference in risk levels between structured and unstructured data and prioritize accordingly.

The post Data Risk Management, Part 3: Assessing Risk Levels of Structured Versus Unstructured Data appeared first on Security Intelligence.

Continue reading Data Risk Management, Part 3: Assessing Risk Levels of Structured Versus Unstructured Data

Data Risk Management, Part 2: Who Is Ultimately Accountable When a Big Breach Happens?

By proactively determining who is responsible for data risk management before a data breach occurs, C-suite executives can help avoid such incidents in the first place.

The post Data Risk Management, Part 2: Who Is Ultimately Accountable When a Big Breach Happens? appeared first on Security Intelligence.

Continue reading Data Risk Management, Part 2: Who Is Ultimately Accountable When a Big Breach Happens?

Data Risk Management: How to Put Executives in the Driver’s Seat

Executives are increasingly viewing data risk management as an area that can reduce costs and increase information security.

The post Data Risk Management: How to Put Executives in the Driver’s Seat appeared first on Security Intelligence.

Continue reading Data Risk Management: How to Put Executives in the Driver’s Seat