A CISO’s 365 Days Journey – Part 4
After building the program for three quarters, seeking feedback from the stakeholders and making course corrections, a CISO should look forward.
After building the program for three quarters, seeking feedback from the stakeholders and making course corrections, a CISO should look forward.
The COVID-19 pandemic has forced both government and higher education to think more about remote data and other cybersecurity concerns.
Responsible for carrying out the election were not just poll workers and election officials, but thousands of IT staffers around the country who defended against cyberattacks.
Authentication factors don’t govern security; the authentication infrastructure determines security. So what’s with all the “killing passwords” talk?
The first 90 days are crucial for establishing credibility as a chief information security officer, or CISO, at an agency.
Even with the sudden shift of circumstance, security experts had already foreseen the eventual need for distributed, remotely applied security.
In the wake of massive computer advancements, why are humans still the ones being asked to generate, know and reveal passwords?
We’ve compiled a list of five killer resources you can use to help protect your agency from whatever witches, zombies and goblins may come your way.
With resource constraints, especially during the current pandemic, the importance of cybersecurity ecosystems has increased considerably.
Data breaches are getting more sophisticated, while agencies’ cybersecurity teams are being held back by manual processes and disconnected systems.