Cybersecurity Workforce Development: Takeaways From a NIST Workshop

Cybersecurity Workforce Development: Takeaways From a NIST Workshop

I had the opportunity to serve as a panelist at the NIST Workshop on Cybersecurity Workforce Development held in Chicago earlier this month. Based on the day’s conversations, there is still much work to be done. Representatives from academia, associations, private industry and government converged for discussions on this critical topic, and there remains broad consensus [...]

Data Analytics Maturity Models and the Control Environment

Data Analytics Maturity Models and the Control Environment

Organizations have recently raised concerns on their data analytics capabilities. There are several motivations for this increased interest in data analytics, such as fulfilling regulatory requirements, increasing efficiency and reducing cost. However, the primary reason is focused on the identification of business opportunities. The most typical questions include: • Are we maximizing the value from [...]

Mobile Computing: Increasing Productivity and Risk

Mobile Computing: Increasing Productivity and Risk

Motorola is credited with creating the first handheld mobile phone. A quick look around in any public place, however, is confirmation that Motorola is now only one of many players in the mobile phone market. Touted as a way for employees to be more productive, cellphones and other mobile devices such as notebooks, netbooks, ultrabooks [...]

Top 10 Considerations for Securing Public Cloud Workloads

Top 10 Considerations for Securing Public Cloud Workloads

The shift to the public cloud has offered organizations increased agility, flexibility and scalability. However, as more and more organizations move critical workloads to the public cloud, the potential for attackers to steal data, intellectual property or computing resources also rises. Below is a brief breakdown of three considerations for securing public cloud workloads. Download the [...]