Get the Security Budget You Need and Spend It Wisely

Many CISOs find it challenging to convince their boards of directors to increase their security budget to mitigate the cost of a potential data breach.

The post Get the Security Budget You Need and Spend It Wisely appeared first on Security Intelligence.

Continue reading Get the Security Budget You Need and Spend It Wisely

Risk Management: Time for Introspection for Asia-Pacific Security Leaders

As per capita income rises in Asia-Pacific, so does the volume of cyberattacks. Security leaders must answer tough questions about risk management.

The post Risk Management: Time for Introspection for Asia-Pacific Security Leaders appeared first on Security Intelligence.

Continue reading Risk Management: Time for Introspection for Asia-Pacific Security Leaders

Security Mistakes Executives Make

Executives don’t always know best. Some mistakes executives make include using weak passwords and failing to follow the same rules as IT professionals.

The post Security Mistakes Executives Make appeared first on Security Intelligence.

Continue reading Security Mistakes Executives Make

Why System Administrators Are So Crucial to Security

System administrators are crucial to the health and security of IT environments, yet many get little to no attention until something goes awry.

The post Why System Administrators Are So Crucial to Security appeared first on Security Intelligence.

Continue reading Why System Administrators Are So Crucial to Security

The Information Security Leader, Part 4: Three Persistent Challenges for CISOs

Today’s business climate presents challenges for CISOs regarding the definition of risk, uncertainties of measuring risk and effective communication.

The post The Information Security Leader, Part 4: Three Persistent Challenges for CISOs appeared first on Security Intelligence.

Continue reading The Information Security Leader, Part 4: Three Persistent Challenges for CISOs

The Information Security Leader, Part 3: Four Fundamental Questions for Risk Analysis

When it comes to a risk analysis, CISOs need to translate the question “How secure are we?” into one of the four fundamental questions about risk.

The post The Information Security Leader, Part 3: Four Fundamental Questions for Risk Analysis appeared first on Security Intelligence.

Continue reading The Information Security Leader, Part 3: Four Fundamental Questions for Risk Analysis

The Information Security Leader, Part 2: Two Distinct Roles of a CISO

Information security leaders today must be able to fill the two distinct roles of a CISO: the subject-matter expert and the trusted business adviser.

The post The Information Security Leader, Part 2: Two Distinct Roles of a CISO appeared first on Security Intelligence.

Continue reading The Information Security Leader, Part 2: Two Distinct Roles of a CISO

The Information Security Leader, Part 1: Two Distinct Roles, Four Fundamental Questions and Three Persistent Challenges

An information security leader today needs to fill multiple roles and be capable of addressing new challenges related to managing risk.

The post The Information Security Leader, Part 1: Two Distinct Roles, Four Fundamental Questions and Three Persistent Challenges appeared first on Security Intelligence.

Continue reading The Information Security Leader, Part 1: Two Distinct Roles, Four Fundamental Questions and Three Persistent Challenges

The Information Security Leader, Part 1: Two Distinct Roles, Four Fundamental Questions and Three Persistent Challenges

An information security leader today needs to fill multiple roles and be capable of addressing new challenges related to managing risk.

The post The Information Security Leader, Part 1: Two Distinct Roles, Four Fundamental Questions and Three Persistent Challenges appeared first on Security Intelligence.

Continue reading The Information Security Leader, Part 1: Two Distinct Roles, Four Fundamental Questions and Three Persistent Challenges