CEOs' risky behaviors compromise security
If shadow IT is a problem with business decision makers, that may be a sign your senior security person isn't engaged at a high enough level.
Kacy Zurkus | 09 Jun | Read more
If shadow IT is a problem with business decision makers, that may be a sign your senior security person isn't engaged at a high enough level.
Kacy Zurkus | 09 Jun | Read more
Security vendors are jumping on the data science, machine learning, AI bandwagon, but don't believe the hype. Here's how to make sure the vendor you're evaluating can make good on its promises of data science prowess.
Kacy Zurkus | 09 Jun | Read more
Whether an adversary is highly skilled and targeting an organization or taking advantage of a black market service to make a few bucks, any threat is a threat.
Kacy Zurkus | 15 May | Read more
Today's reality is that if the enterprise uses networked computers, they will get hit at some point. Not having and practicing a recovery plan could be the doom of any organization.
Kacy Zurkus | 05 May | Read more
Believing that their security program is good enough means there's a good chance they’ll be breached. Here are some lessons from the bigs guys for the SMBs.
Kacy Zurkus | 02 May | Read more
SIEM technology is old, and possibly not properly configured making it vulnerable to attacks.
Kacy Zurkus | 20 Apr | Read more
Why web browsers leave security engineers constantly playing defense.
Kacy Zurkus | 07 Apr | Read more
A good security program includes prevention, detection, and response, so security practitioners need to focus on the vulnerabilities that matter.
Kacy Zurkus | 06 Apr | Read more
As the digital enterprise struggles to find the best security solutions to defend their ever-expanding networks, many are looking to next generation tools that offer interoperability capabilities.
Kacy Zurkus | 27 Mar | Read more
Overcoming obstacles that challenge women from entering and staying in the security industry
Kacy Zurkus | 21 Mar | Read more
Mobile devices have transformed the digital enterprise allowing employees to access the information they need to be most productive from virtually anywhere. Has that convenience come at a cost to enterprise security, though?
Kacy Zurkus | 10 Mar | Read more
Does attack attribution and knowing your adversaries really matter when it comes to securing the enterprise?
Kacy Zurkus | 08 Mar | Read more
Widespread availability of RaaS and botnet rentals for DDoS attacks make it easy for those without technical skills to enter into cyber crime
Kacy Zurkus | 14 Feb | Read more
Being judicious about social media use and staying away from WiFi protects executives and the enterprise.
Kacy Zurkus | 08 Feb | Read more
Macs are really no more secure than a PC, but for many years there just weren’t as many out there because of the expense of the hardware and other issues. They've historically been a much less popular choice among both consumers, enterprises, and hackers alike.
Kacy Zurkus | 01 Feb | Read more