It's not the number of moving pieces in your security program that matter; it's how those pieces are making your organization more resilient that truly counts. How do you achieve that goal?
When reporting to the board of directors, the majority of CISOs measure the effectiveness of their program against a proven model. But what exactly should a CISO be measuring and reporting? Here are some top recommendations.
The rapid growth of extremist groups poses many challenges to enterprise security. How has social media and the Internet provided radical groups the means to spread their ideologies and what are the challenges with identifying and countering these groups?
Attribution is often regarded as a primary goal within a cybersecurity investigation, but as John McClurg, CISO at Blackberry, explores here, conclusive attribution should at times exist as a secondary consideration - one abandoned if the ROI doesn't justify its expense.
The IBM X-Force Threat Intelligence Index 2020 highlights how cybercriminals' techniques have evolved after decades of access to tens of billions of corporate and personal records and hundreds of thousands of software flaws.
It’s one thing to ensure that all of the possible threat entry points are covered by an organization’s security infrastructure, it’s another to ensure proactive protection.
With the demand for highly skilled cybersecurity experts growing every day, the University of Guelph will launch a new graduate degree in cybersecurity and threat intelligence to train the next generation on how to stop cyberattacks before they happen.