Information Security Leader, Author, Instructor and Speaker

Default utility Image

When Is a Business Ready for a Red Team Test? TAGS: | | | Cybersecurity teams spend countless hours designing, implementing and managing security controls to protect against confidentiality, integrity and availability threats. Teams …Continue reading →

Default utility Image

Essentials to Consider When Choosing a Cloud Security Posture Management Solution TAGS: Today, cloud computing plays a central role in the technology ecosystems of every college and university. The degree of cloud …Continue reading →

Default utility Image

How Agencies Can Tackle Supply Chain Cybersecurity Threats TAGS: Cybersecurity professionals have worried for years about the insidious risk posed by supply chain attacks — that sophisticated attackers with the ability …Continue reading →

Default utility Image

GDPR and CCPA: Businesses Must Comply With Both, and They’re Not the Same TAGS: | The past few years presented businesses around the world with a dizzying array of new and changing requirements for handling …Continue reading →

Default utility Image

How Agencies Can Secure Data from Shared Documents After Users Leave TAGS: A decade ago, agencies struggled to build collaborative workplaces because the technology to facilitate teamwork simply didn’t exist. The advent …Continue reading →

Default utility Image

IDC PlanScape: IT Security ? Building Enterprise Cyber-Resilience TAGS: | Fortunately, information technology (IT) professionals can draw upon the long history of resilience engineering in other fields to develop their …Continue reading →

Default utility Image

IDC PlanScape: Privacy Engineering TAGS: “Meeting privacy expectations of management and stakeholders requires a cross-functional approach with contributions from business leaders, privacy professionals, technologists, and …Continue reading →

Default utility Image

IaaS Offers Critical Agility, Scale and Innovation for School Districts TAGS: | Last spring’s rapid shift to remote learning may have taken many education IT teams by surprise, but the technology supporting …Continue reading →

Default utility Image

How to Choose an Identity and Access Management Solution for Higher Education TAGS: | | From a string of high-profile ransomware attacks to the compromise of SolarWinds network monitoring tools, higher education continues to find …Continue reading →

Default utility Image

5 key ransomware protection best practices to safeguard assets TAGS: | Ransomware attacks are expected to grow both in frequency and effectiveness in 2021, with researchers at Cybersecurity Ventures predicting attacks …Continue reading →