Effective security starts from the inside
The need to see eye to eye with board members and business executives about information security has been background noise during the tenure of many a CISO.
David Braue | 09 Jul | Read more
The need to see eye to eye with board members and business executives about information security has been background noise during the tenure of many a CISO.
David Braue | 09 Jul | Read more
University qualifications in cybersecurity are important but are only a start to keeping up with the changing cybersecurity threat, according to a corporate cybersecurity executive and educator who is currently leading nearly 3500 attendees through an online cybersecurity skills course focused on phishing countermeasures.
David Braue | 30 Apr | Read more
Anytime a new flashy household device is released on the market, internet connectivity is promoted as one of its main features.
Robert Le Busque | 13 Dec | Read more
End-users are juggling far more passwords than prior studies have estimated, according to a new analysis by LastPass that suggests the average employee is tracking 191 different passwords.
David Braue | 02 Nov | Read more
Disruption and repetitional damage have become legitimate goals of cybersecurity activity
David Braue | 11 Sep | Read more
Are you sick of usernames and passwords as a method of user authentication? Verizon says it has a better way. It's beefing up its Universal Identity Services portfolio with a QR code login that enterprises can deploy to streamline logins for both internal and external users.
Thor Olavsrud | 27 Aug | Read more
To use Cloud computing securely requires companies to know where their data is stored and who has access to it. Ironically, the reason Cloud is so popular is because organisations don't want to worry about these details. So can the issue be solved by adhering to standards? Increasing legislation? Maybe we need a global technical disaster to ‘sober up’ an industry drunk on the power of Moore's Law.
Assess Yourself Against Key Verizon