Top 10 Considerations for Securing Public Cloud Workloads

Top 10 Considerations for Securing Public Cloud Workloads

The shift to the public cloud has offered organizations increased agility, flexibility and scalability. However, as more and more organizations move critical workloads to the public cloud, the potential for attackers to steal data, intellectual property or computing resources also rises. Below is a brief breakdown of three considerations for securing public cloud workloads. Download the [...]

Cyberpsychologist Mary Aiken: New Threats Demand New Solutions

Cyberpsychologist Mary Aiken: New Threats Demand New Solutions

Editor’s note: Dr. Mary Aiken, a cyberpsychologist, expert in cyber behavioral analysis and author, will deliver the closing keynote address at CSX North America 2017, to take place 2-4 October in Washington, D.C., USA; and CSX Europe 2017, to take place 30 October-1 November in London. Aiken recently visited with ISACA Now about several of her core areas [...]

The Real Solution To Youth Cyber-Crime

The Real Solution To Youth Cyber-Crime

The National Crime Agency recently revealed a fascinating intelligence assessment, uncovering the ‘pathways into cyber crime’. The key finding was that most young hackers are motivated, not by financial reward, but by idealism. The NCA added that many of those involved in cyber-crime had “highly marketable” skill sets, and evidence showed that positive role models could help steer ex-offenders [...]

Security Needs Vs. Business Strategy – Finding a Common Ground

Security Needs Vs. Business Strategy – Finding a Common Ground

Even before cloud adoption became mainstream, it wasn’t uncommon for IT security needs to conflict with both business strategy and end user preferences. Almost everyone with a background in security has found themselves in the awkward position of having to advise on going against a technology with significant appeal and value because it would introduce [...]