How to conduct a proper GDPR audit: 4 key steps
Organizations subject to the EU's General Data Protection Regulation should do regular compliance audits. Here are the steps experts say you should take.
Bob Violino | 23 May | Read more
Organizations subject to the EU's General Data Protection Regulation should do regular compliance audits. Here are the steps experts say you should take.
Bob Violino | 23 May | Read more
Top execs make big targets, especially when traveling abroad. Here’s how to protect C-level officers from whaling, espionage, and themselves.
Bob Violino | 15 Jan | Read more
Sure, a big preventable breach might easily cost a CISO his or her job. A few less obvious missteps could do the same.
Bob Violino | 21 Nov | Read more
Protecting executives today is about much more than physically shielding them from danger.
Bob Violino | 16 Aug | Read more
Executive protection requires risk assessment and adherence to rules. Here's how you get executive buy-in.
Bob Violino | 11 Aug | Read more
CISOs and CSOs should be heartened by the fact that more colleges and universities are offering academic programs and degrees in cyber security specialties. They are also doing their best to place young professionals into the workforce.
Bob Violino | 06 Jul | Read more
Recently hired security leaders share what hiring execs want to know in interviews.
Bob Violino | 22 Jun | Read more
A wide range of technical skills and curiosity about the mechanics and goals of an attack are key for effective incidence response.
Bob Violino | 21 Jun | Read more
In some cases traditional authentication processes are not enough to provide strong security throughout a user work session. That’s where continuous authentication comes in.
Bob Violino | 14 Mar | Read more
If security executives thought they had a lot to handle with the growth of mobile devices and the expanding digital enterprise, the emergence of connected products, corporate assets, vehicles and other “things” is taking security coverage to a whole new level.
Bob Violino | 10 Feb | Read more
This has been another eventful year in the realm of cyber security—with a number of high-profile data breaches that affected large numbers of people and technological developments that promise to impact the market for years to come.
Bob Violino | 16 Dec | Read more
The prospect of an army of robots marching in unison to launch an attack on an unsuspecting city belongs in the realm of science fiction—as do most images of menacing autonomous machines wreaking all kinds of havoc on civilization.
Bob Violino | 09 Nov | Read more
Security risks, both cyber and physical, certainly belong on the list of concerns. And with the ongoing shortage of professionals who are expert in various aspects of data protection—coupled with the seemingly endless stream of reports about data breaches and other security threats—this has become an even bigger concern for companies that are considering or in the midst of M&A deals.
Bob Violino | 14 Sep | Read more
As big data initiatives gain steam at organizations, many companies are creating “data lakes” to provide a large number of users with access to the data they need. And as with almost every type of new IT initiative, this comes with a variety of security risks that enterprises must address.
Bob Violino | 25 Aug | Read more
The Internet of Things (IoT) offers many possible benefits for organizations and consumers—with unprecedented connectivity of countless products, appliances and assets that can share all sorts of information. IoT also presents a number of potential security threats that organizations need to address.
Bob Violino | 09 Jun | Read more