Hybrid multi-cloud deployments have become commonplace in the enterprise, resulting in data becoming more dispersed than ever. Not only do organizations have to consider which services should be run in on-premises, public cloud, private cloud or hybrid cloud environments; they must also determine how data security will be applied to…
Read More
Sunday night has the must-see TV again this spring — and I’m not just talking about “Game of Thrones.” While the HBO juggernaut may contain some cybersecurity examples if you look hard enough, BBC America’s “Killing Eve” is packed with lessons we can all take away about security, especially with…
Read More
co-authored by Jill Dhillon Every chief information security officer (CISO) knows that identity and access management (IAM) is a critical component to safeguarding the organization’s systems, data and applications from unauthorized users. But IAM programs are becoming increasingly challenging due to the complexity of more devices, applications, information, users and…
Read More
Just how much are companies struggling to get a handle on cybersecurity risks and digital disruption? According to the National Association of Corporate Directors (NACD)’s “2019 Governance Outlook,” boards are uneasy about the various digital risks their organizations face. The report is designed to provide leadership with a picture of…
Read More