Details matter when developing an incident response (IR) plan. But, even the most successful IR plans can lack critical information, impeding how quickly normal business operations are restored. Read More ▶ |
|
| White Paper: Microsoft Corporation Written specifically for government records officers and their IT departments, this compelling e-guide looks at the growing challenge of managing an ever-increasing amount of electronic records and provides recommendations for a time-saving regulation- and mandate-compliant solution. Read More ▶ | For years the evolving role of chief information security officers has increasingly required them to think more like a chief risk or strategy officer and anticipate cyber threats before they happen. Now a perfect storm is brewing that may finally push risk management and strategy roles to the forefront of cybersecurity. Read More ▶ |
| Today’s detection deficit between attackers and defenders is near an all-time high – and the gap is only getting wider. While many factors contribute to this deficit, among the top is the fragmentation of people, processes, and technologies. Adam Vincent, co-founder and CEO, ThreatConnect, describes best practices for overcoming security fragmentation. Read More ▶ |
| | The biennial (ISC)2 report shows that the percentage of women in cybersecurity remains unchanged. Given the significant shortfall of security talent, what can we learn from this report about how to fix our weak and leaky pipeline? Read More ▶ |
| Patrick Dennis shares insights on the changing nature of endpoint protection and the resulting need for rapid detection matched to confident action Read More ▶ |
| Virtual CISOs can be an invaluable resource for companies with limited resources. But are they a short-term fix to a long-term problem? Read More ▶ |
| Computerworld's Premier 100 tech leaders share pointers on how to sell digital transformation within IT and across the organization (hint: say goodbye to hierarchies). Watch Now ▶ |
| White Paper: Insight Today's employees want the ability to work anywhere, anytime. But in order to give your team reliable, flexible options to optimize mobile workforce productivity, your business needs a strategy to manage device security. Download the complimentary Forrester report to learn what steps you can take to enable a successful Bring Your Own Device (BYOD) policy. Read More ▶ | Top 5 Stories | Editor's Picks |
|
|
|