NormShield
Posted on: 28 Jul 2020
NormShield reduces the uncertainty of your cyber risk with a high quality platform that does the work for you. Created from a hacker’s perspective, we’re not another cyber rating tool. Our platform tells you which vendors pose the highest risk to your company without creating more labor on your end. The platform is scalable, all-encompassing, and tailored to identify your problem areas. NormShield is also the ONLY cyber risk rating system that can measure the cost associated with a potential third party cyber breach. Know the risk every organization in your ecosystem poses in dollars and cents. Learn more at www.normshield.com
A CISO’s Guide to Principles of Data Privacy and Security
Posted on: 20 Nov 2017
A CISO’s Guide to Principles of Data Privacy and Security by David Sheidlower, currently CISO for an international media and advertising firm, examines the key issues surrounding data privacy and…
A CISO’s Guide to Phishing and Malware
Posted on: 20 Nov 2017
A CISO’s Guide to Phishing and Malware examines real-world examples of advanced targeted attacks via email and social media to show how these evolving threats are increading an organization’s business risks. Cybercrime…
Attack Campaigns: Connecting the Dots to Disrupt the Adversary – sponsored
Posted on: 20 Nov 2017
Adversaries have patience and expect to persevere over any and all obstacles that stand in front of them. Their toolkit is not limited and if at first they don’t succeed…
Attack Campaigns: Connecting the Dots to Disrupt the Adversary – sponsored
Posted on: 20 Nov 2017
Adversaries have patience and expect to persevere over any and all obstacles that stand in front of them. Their toolkit is not limited and if at first they don’t succeed…
User Authentication Gets Flexible – sponsored
Posted on: 20 Nov 2017
It’s no secret, password secrets haven’t held up for quite some time against attacks targeting consumers and enterprise organizations. Breach after breach, credential compromise seems to be the path of…
The Hunter Becomes the Hunted – sponsored
Posted on: 20 Nov 2017
As the world becomes more connected, it is no longer enough for enterprises to react once an alert indicates an attacker is on the network. What if security teams seek out…
Beyond Trust – Privileged Account Management for Federal Agencies
Posted on: 20 Nov 2017
Agencies grant access privileges easily and out of necessity, but they struggle to manage these privileges as employees move throughout divisions. Revoking unnecessary access tends to be forgotten and the…
Trend Micro – Elastic Infrastructure Needs Elastic Security
Posted on: 20 Nov 2017
Organizations are adopting virtualization and cloud technologies as a foundation for their strategic business growth. Whether they deploy private cloud, public cloud or hybrid architectures, this is where IT investments are going…
CISOs Investigate: Endpoint Security
Posted on: 20 Nov 2017
CISOs Investigate: Endpoint Security includes the viewpoints of 13 security leaders who have deployed or are looking to deploy third-party solutions. This report replaces the ad hoc, often informal and…