3 mistakes organizations make when trying to manage data securely

Data security is complex. With each day, there is an increase in data volume, data type, and data source or storage. Yet, despite all of the technological advancements in this space, companies still struggle and often overlook some of the most basic pr… Continue reading 3 mistakes organizations make when trying to manage data securely

Security stack consolidation helps CISOs lower cybersecurity spending

In this Help Net Security video, Alfredo Hickman, Head of Information Security at Obsidian Security, discusses the importance of security stack consolidation for organizations looking to reduce security costs while increasing security efficiency and ef… Continue reading Security stack consolidation helps CISOs lower cybersecurity spending

Top outcomes organizations want from their security investments

Preventing data breaches and safeguarding remote workers are among the top security priorities and outcomes organizations want from their security investments, according to WithSecure. WithSecure polled over 3,000 IT decision makers, IT influencers, an… Continue reading Top outcomes organizations want from their security investments

Educational institutions must reverse their backward approach to cyber defense

As schools have become more digital, they’ve taken a somewhat backward approach to cybersecurity, historically moving slowly, and have weak cybersecurity controls and protocols. In this Help Net Security video, Raj Dodhiawala, CEO at Remediant, talks a… Continue reading Educational institutions must reverse their backward approach to cyber defense

Cost-effective steps healthcare CISOs can take to mitigate damaging attacks

Cybersecurity measures are increasingly failing to close gaps, and the healthcare industry, in particular, has become a high-dollar target due to limited budgets and quick ransom pay-offs. In this Help Net Security video, Maureen Kaplan, Chief Revenue … Continue reading Cost-effective steps healthcare CISOs can take to mitigate damaging attacks

New RSA Conference CEO talks about delivering value

Kylie Wright-Ford was recently named CEO of RSA Conference LLC. She joins RSAC with an extensive track record of building communities for business professionals, having served in leadership roles at leading organizations, such as World 50 and GLG. In t… Continue reading New RSA Conference CEO talks about delivering value

How government organizations can stay steps ahead of attackers

Attacks against governments are nothing new. They have been an interesting target since they have existed, for the mere reason that not everyone agrees on how things are run. In this Help Net Security video, David Masson, Director of Enterprise Securit… Continue reading How government organizations can stay steps ahead of attackers

Purpose-based access control: Putting data access requests into context

Access control is the heart of data protection. Striking the right balance between easy access and tight security isn’t easy, but getting it right is how you maintain business agility while still meeting regulatory and fiduciary data protection respons… Continue reading Purpose-based access control: Putting data access requests into context

Increasing network visibility is critical to improving security posture

IT leaders around the world share a ubiquitous appetite for greater network visibility. The findings of a Forrester Consulting study underscore a convergence in security with networking, which IT decision-makers now view as the missing strategy that wi… Continue reading Increasing network visibility is critical to improving security posture

How to create a data integration strategy for your organization

Developing a strategy for integrating data across your organization helps ensure that everyone has access to the most up-to-date data in a secure way. This article provides an example of a strategy you can use to develop your own.
The post How to creat… Continue reading How to create a data integration strategy for your organization