It’s vital for C-suites to include cybersecurity as part of their capital planning. And the key to that is determining what “just enough security” is for the organization to meet its business goals. What’s the best way to determine how much security is “just enough”?
Where does the responsibility for code vulnerabilities lie, and how can cybersecurity leaders address these vulnerabilities? Find tools for determining the security of code and mitigating cyber risk in your organization.
By keeping a pulse on evolving threats and monitoring the entire environment, security leaders can mitigate their institutions’ cyber risk and keep networks, data and users secure.
Organizations need to maintain balance in their security approach. The most secure organizations have support from senior leadership and follow these seven steps to protect their assets and collaborate as a team.
The tech giants that the CCPA attempted to target were able to escape liability by capitalizing on a convenient loophole that excluded data analytics from the definition of a sale. New CCPA enforcement letters could have major implications for the broader data ecosystem —
third-party data may disappear as we know it. The time has come to provide consumers with value for opting in.
November is Infrastructure Security Month and a time to think about how organizations can contribute to the security and resilience of the U.S.'s essential services and functions.
You must’ve heard it dozens of times by now: passwords are not secure enough to protect business data. But everyone mentions alternatives to passwords as if uprooting your current identity authentication system is a piece of cake.
In conjunction with the NBA, the Dallas Mavericks has announced that beginning Nov. 15, fans seated beyond 15 feet of the court will no longer need to complete a Fan Health Survey to enter the game at the American Airlines Center.
Jeffrey Feinstein, Vice President of Global Analytic Strategy, LexisNexis Risk Solutions, had the honor of serving on a Federal Reserve committee this past winter to define synthetic identity fraud. The result of this effort was the release of a paper that defines it for the industry, an essential step forward in the fight against this pervasive threat.
Incidents tend to happen at the seams and cracks of your organization, where the automation is incomplete, observability is not omniscient, and humans are still in the loop. Our blind spots are constantly evolving, and we must update our mental models of how to approach security accordingly.