Why Is It So Hard to Explain Cybersecurity?

As someone who has been in the cybersecurity industry for many years, I have witnessed more confused, perplexed, dazed and otherwise confounded looks than I care to admit. Nearly all of them asked simple questions like “What do you do at your job?” or “How do you actually secure XYZ?” Recently, I have been hearing […]

Continue Reading

(ISC)² Releases Set of Cybersecurity Tips for Home Owners

To celebrate the 11th annual National Cyber Security Awareness Month (NCSAM), (ISC)² has released its third set of tips by security experts: cybersecurity tips for home owners. “Whatever browser you use (Chrome is best), make sure you are using the site evaluation tools available to help identify safe/not-so-safe sites. With this, you get a color-coded […]

Continue Reading

(ISC)² Global Research Program to Track Cybersecurity Skills Gap and Landscape Now Open

In our digitally-driven world, it’s crucial to have a current understanding of the evolving risks and responsibilities that information security professionals face. The (ISC)2 Global Information Security Workforce Study (GISWS) is the only research available that truly offers a detailed picture of how the global cybersecurity professional is changing and driving other business factors. A […]

Continue Reading

The Future of GRC Technology: Reporting from the Customer Perspective

Earlier this year, OCEG released its global 2014 GRC Technology Strategy Survey report and it reveals some expected and some unexpected findings. More than half of the 273 participants indicate that their organizations are currently underutilizing technology that they have acquired to manage governance, risk and compliance (GRC) needs. Not surprising, really, since they also […]

Continue Reading

Time To End Network Sprawl in Your Virtualized Data Center

We’re on the road across North and South America with Citrix and CA for the next few weeks. Join us to talk about how enterprises can streamline virtualized data centers, radically simplify network services for delivering critical applications, and reduce complexity and cost, all without sacrificing performance and security. See the full list below and click […]

Continue Reading
%d bloggers like this: