WannaCry is the latest cyberattack ransomware that wreaked havoc on thousands of computers in over 150 countries last month. Its global reach has IT and security companies worldwide reevaluating their cybersecurity protection approaches.
A new approach to cyberdefense combines man and machine to stop cyberattacks. With automated investigation, complex threats are detected early and accurately. Cybersecurity analysts are able to monitor, analyze, and cross-reference data across the entire attack chain.
Physical security and logical information networks within organizations have traditionally been completely separate, but a new form of cybersecurity and physical security convergence has started to emerge over the past few years. Has the convergence movement taken hold as a corporate culture?
The orientation process for new employees can be like drinking from a fire hose, with a lot of information—and not all of it completely relevant for them—in a short period. The Security department may play a large or small role in this discussion, and it’s critical that the presenters provide consistent, useful information that the […]
Security professionals in health care are relied upon to both mitigate and manage huge complexes and remote facilities. The need to balance and maintain a welcoming environment, while protecting the people and assets within these healthcare facilities is a monumental task.
IT, cybersecurity, and security management practitioners appear to be split on the necessity of paying so-called “ransomware release fees” to cyber crooks who have held their company’s network systems hostage with software intrusions that lock down certain segments like payroll. Some IT people have a pragmatic attitude about paying off these cyberattacks, which often come […]
IT leaders are embracing automation, saying that it is absolutely necessary for digital transformation. They believe in automation so much, in fact, that nearly three-quarters of them say that businesses that fail to automate will fail within 10 years.
Companies everywhere are making the transition from on-premises servers to cloud-based e-mail services. This switch is an opportunity for IT leaders to tighten their security controls.
With perceptions of IT’s value and its status within an organization in constant flux, it can be difficult for IT leaders stay relevant. See how one IT executive navigated these tricky waters wherein technology’s role in business is often contradictory.
Whenever IT has a big project to complete, it often comes with required executive approvals. However, CEOs (and other managers) are more likely to give the green light to projects they understand. Here’s how to bring them up to speed on data projects.