Don’t Let the Dow Jones Security Incident Happen to You: Strategies and Steps for Vendor Risk Management

Here we go again. When news broke Feb. 27 that a Dow Jones database of 2.4 million businesses and individuals was left on a public server without encryption or password protection, it exposed one of cybersecurity’s most chronic and pernicious problems: risk from third-party vendors and contractors. A Dow Jones spokesperson blamed an unnamed “authorized…

Details

Software Defined Access: The New Requirement for Remote Work Environments

Technology is rapidly changing work as we know it. Work is no longer bound by a physical place or specific time. Organizations must adapt to a multigenerational labor force and one that is more task oriented, target focused, and gig based. To ensure the productivity of remote workers, access to business applications, including email, video…

Details

Debunked: 5 Myths of Privileged Access Management

From a cybersecurity standpoint, 2018 was a disaster. We saw three of the ten biggest data breaches of all time, according to USA Today: Marriott (500 million accounts), Under Armour (150 million) and Quora (100 million). High-profile data breaches seemed to make headlines every day, as attackers continued their assault on companies that are not…

Details

Don’t Let Complexity Get the Best of You

Computer networking has always evolved at a rapid pace, but it seems to be accelerating at a far greater rate today, resulting in unprecedented challenges for network security managers. The advent of the Internet has brought unprecedented access and the cloud has increased the speed of development and delivery. Now, containers and microservices provide the…

Details

Stopping the cat-and-mouse game

If I were a cyber attacker, I wouldn’t go after just any user. I’d target privileged users. They are the people who hold the keys to the kingdom, so to speak – the sensitive information, the crown jewels. They have supervision and control over the enterprise’s servers, endpoints, databases, and customer and employee information. And…

Details

Shifting Your Cybersecurity Strategy to Stop People-Centric Threats

Keeping companies safe from determined cybercriminals is an everyday battle as threats continue to evolve and business practices change. For many security teams, the question remains: What steps should organizations take today, and what should they anticipate tomorrow? According to Bhagwat Swaroop, EVP of email security for global cybersecurity company Proofpoint, the threat landscape has…

Details

How to Write a Great CISO Resume – Know What to Include

Managing Partner, Caldwell Partners The Chief Information Security Officer (CISO) job has changed significantly in the last couple of years. It has historically been more of a lower-level, tactical IT job, but now has become a higher-level strategic, business-oriented role around enterprise risk management. With that shift in the job responsibilities, the specifications have changed,…

Details