Top 2017 IT and Cyber-Security Predictions

Top 2017 IT and Cyber-Security Predictions

This posting presents information about some of the IT and Cyber-Security events forecasted to happen in 2017. As members of organizational risk management and IT security teams have planned and are now executing their 2017 strategies of risk mitigation — it is a good time to review some of the most popular and potential predictions […]

This posting presents information about some of the IT and Cyber-Security events forecasted to happen in 2017. As members of organizational risk management and IT security teams have planned and are now executing their 2017 strategies of risk mitigation — it is...
Cloud Security Highlights Major Cyber-Security Threats for 2016

Cloud Security Highlights Major Cyber-Security Threats for 2016

Cloud security remains a top concern for many companies, especially when business units acquire cloud services independent of the IT department. To help illustrate the problems such practices can create, the Cloud Security Alliance (CSA) has compiled its list of “The Treacherous 12: Cloud Computing Top Threats in 2016.” The 2016 Top Threats release mirrors […]

Cloud security remains a top concern for many companies, especially when business units acquire cloud services independent of the IT department. To help illustrate the problems such practices can create, the Cloud Security Alliance (CSA) has compiled its list of “The...
Cloud Security: An Ongoing Risk Mitigation Process

Cloud Security: An Ongoing Risk Mitigation Process

Cloud Security must remain the top objective when organizations consider moving their data over to a cloud computing platform.  While cloud computing offers businesses many benefits, an organization choosing to place its intellectual property along with its customer information and corresponding emails into a cloud computing environment will also have to come to the realization […]

Cloud Security must remain the top objective when organizations consider moving their data over to a cloud computing platform.  While cloud computing offers businesses many benefits, an organization choosing to place its intellectual property along with its customer...
Information Security Remains a Risky Business

Information Security Remains a Risky Business

It’s been a common information security event in the news for all too many business enterprises —- e.g. yet another large publicly traded company is the recent victim of a data breach. The situation is worsened, when not only business information is breached but also millions of customer’s personal and financial information records are compromised. […]

It’s been a common information security event in the news for all too many business enterprises —- e.g. yet another large publicly traded company is the recent victim of a data breach. The situation is worsened, when not only business information is breached but...
Can Effective Information Security Controls Maintain Organizational Resilience?

Can Effective Information Security Controls Maintain Organizational Resilience?

Effective information security controls are a good defense against cyber threats. However, will that be enough to keep the doors of your company open for business over the long term? Hiring a capable and effective information security analyst staff, or increasing your budget to expand information security jobs in your organization may prove your upper […]

Effective information security controls are a good defense against cyber threats. However, will that be enough to keep the doors of your company open for business over the long term? Hiring a capable and effective information security analyst staff, or increasing your...

Pin It on Pinterest