Even though they’ve been around for quite some time, phishing attacks continue to climb. According to Proofpoint’s 2019 “State of the Phish Report,” 83 percent of businesses experienced a phishing attack and 64 percent of security professionals encountered spear phishing threats in 2018. New vectors are also emerging: As noted…
Read More
For almost 15 years now, companies have been using the Common Vulnerability Scoring System (CVSS) to determine the criticality of security vulnerabilities. Ten is the highest score, meaning the most severe, while zero is the lowest. Over time, the CVSS has become something of a de facto industry standard used…
Read More
This is the second installment in a multipart series about data encryption. Be sure to read part one for the full story. Now that we understand the common threats facing organizations and how to select the right solution for data-at-rest encryption (DaRE), what’s the next step in your data encryption…
Read More
Next time someone says it’s difficult for women to advance in the global security or technology sector, point them in the direction of IBM. At the very top of the tree is Ginni Rometty, global CEO, who is joined by Shamla Naidoo as the chief information security officer (CISO) —…
Read More