How Your Business Can Benefit from a Network Security Policy Your email has been sent A company’s network must be secured to ensure the safety of its data against the risks of cyberthreats. With the ...
Jody Brazil, CEO and Cofounder of FireMon, brings 20+ years of tech leadership, driving growth and innovation in security solutions. My previous article explored some strategies enterprises can adopt ...
Users often see IT security policies as a hindrance. Empathetic policy engineering helps CISOs to promote acceptance and implement security effectively. In many companies, IT security guidelines ...
The FBI is in the midst of a major rewrite of the security policy that sets minimum criteria for how its criminal justice information is protected. With the revamp, the bureau is aiming to make sure ...
Although mobile devices are now a workplace necessity, using them increases the risk of cyberattacks. Quantas recently confirmed a breach reportedly started by phone-based social engineering (vishing) ...
As educational institutions grow in size and complexity, it becomes more difficult to keep track of everything that’s going on around campus. Departments are often siloed. This leads to ...
I recently learned that an acquaintance of mine did something dishonest in the name of information security, apparently in order to preserve or advance his own career. Stu (not his real name) acquired ...
On October 21, Japan’s new prime minister, Takaichi Sanae, formed her Cabinet. The political environment surrounding Japan has grown increasingly challenging, forcing the Liberal Democratic Party (LDP ...