The stuck-at-home chronicles have fast become surreal, as remote workers face down a killer virus on the one hand and the flattening of their work and personal lives on the other. To help, many have rushed to adopt Zoom. And for many use cases - hint: not national security - it is a perfectly fine option.
Organisations need to think carefully about a future that relies on getting by with existing resources versus outsourcing some or all of their security operations to a trusted advisor. There's never been a more important time to make that decision.
Download this guide on addressing the cyber skills shortage and...
At its core, cybersecurity is about applying scarce resources to the highest risk. And nothing quite puts that tenet to the test like the COVID-19 pandemic. Jim Routh, CISO of MassMutual, discusses the challenges of managing a remote workforce and third-party relationships during this crisis.
While responding to the COVID-19 crisis, supply chain risks can be better managed if an organization continues to rely on its longtime vendors, says Daniel Bowden, CISO at Sentara Healthcare, who offers insights on third-party security risk management in the current environment.
An emerging technology, Vvendor Privileged Access Management (VPAM) can provide both operational efficiencies and increased security in your projected ROI analysis. And that is a rare combination in InfoSec these days.
As automobile manufacturers and others rush to shift to production of ventilators and other medical equipment and supplies to help fight the COVID-19 pandemic, they must take steps to ensure security, privacy and safety risks are addressed, says technology attorney Steven Teppler.
Traditionally, security teams look to penetration tests and red teaming to test and build confidence in their security programs. These options are often costly, time-consuming, and limited in scope. There is a better way to gain confidence in security models: continuous attack simulations, which automate adversary...
Want to maximize your digital transformation project success and impact? Start by ensuring that you correctly explain risk to stakeholders, as well as continually benchmark your organization's risk management maturity, says ServiceNow's Barbara Kay.
In this brand new research report, "Internet Risk Surface in the Financial Sector," RiskRecon and the Cyentia Institute analyzed how organizations in the finance sector are managing digital risk. We set out to determine what the key dimensions of risk are that influence exposure, how that compares to other industries...
How can the use of "smart contracts" based on distributed ledger technology help improve the overall security picture for healthcare system supply chains? Mitch Parker, CISO of Indiana University Health, explains.
Risk management is the foundation upon which many institutions are built, but many important questions remain: What are the key dimensions of internet risk surface? How does that surface compare to other sectors? Which specific industries appear to be managing that risk better than others?
RiskRecon and the...