How to implement mindful information security practices
Tech Republic Security
JANUARY 8, 2021
Mindfulness is all about being aware, so why not incorporate that in your cybersecurity practices?
This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Tech Republic Security
JANUARY 8, 2021
Mindfulness is all about being aware, so why not incorporate that in your cybersecurity practices?
Network World
APRIL 26, 2017
Just use Google to learn how to access the Dark Web, and you can find hackers who, for a price, are more than happy to write malware, create highly effective spear phishing campaigns and develop bogus websites for harvesting login credentials. Also on Network World: DDoS-for-hire services thrive despite closure of major marketplace +.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Tech Republic Security
JUNE 21, 2024
Immersing yourself in best practices for ethical hacking, pen-testing and information security can set you up for a career or better-protected business.
CIO Business Intelligence
NOVEMBER 27, 2024
A hybrid approach often offers the best solution, allowing organizations to store and process sensitive information securely on-premises while leveraging the scalability and flexibility of the cloud for less critical workloads.
Information Week
MARCH 14, 2024
Chief information security officers are on the job hunt. What should they be looking for in an offer?
Network World
OCTOBER 21, 2024
Now, when interns come in for apprenticeship sessions with the NYC DOE security team, they learn how to work with various tools and sit in on calls with our vendors to troubleshoot and manage these products. Brian even shared code that the students could use to practice their skills. Zscaler Private Access (ZPA) is one such example.
IT Toolbox
FEBRUARY 22, 2024
Learn how CISOs (chief information security officer) can leverage financial metrics to communicate cybersecurity success effectively to the board. The post 3 Metrics CISOs Should Present to the Board and How to Calculate Them appeared first on Spiceworks.
Information Week
SEPTEMBER 4, 2018
Director, Information Security at First National Technology Solutions, shares examples of how to apply your existing IT tools to work for your cloud security strategy. Robert LaMagna-Reiter, Sr.
CIO Business Intelligence
APRIL 6, 2022
Shamim Mohammad, EVP and chief information and technology officer at CarMax , will present a case study on how the cloud enables the company’s signature “Instant Offer” feature. Priceline Chief Technology Officer Marty Brodbeck will share how the online travel agency sped up its cloud native software production.
Network World
JULY 9, 2024
For example, by understanding the different layers, enterprise security teams can identify and classify physical access, where the data is sitting, and provide an inventory of the applications that employees use to access data and resources. We couldn’t agree more.
Network World
MARCH 13, 2017
Multiple times each year, LinkedIn feeds and information security forums light up with examples of the latest and greatest versions of phishing attacks. This article on W-2 scams sprung from a conversation I had with my colleague Steve Williams, who ended up being my co-author. Check out more about him at the end of this piece.
CIO Business Intelligence
OCTOBER 31, 2023
Appointing security advocates within development teams Discover also runs the Security Champions program to identify security advocates within each application team. These advocates can help identify risks and misconfigurations in the code and receive training on how to address them.
CIO Business Intelligence
APRIL 18, 2023
Fractional CIOs are frequently tapped by small to midsize organizations that may not be able to afford the expense of a full-time CIO, says Randy Trzeciak, director of the masters of science information security policy and management program at Carnegie Mellon University’s Heinz College.
CIO Business Intelligence
MARCH 30, 2022
Despite much discussion about how to icrease the percentage of women in cybersecurity roles over the last decade, women make up only 25% of the global cybersecurity workforce, according to the latest (ISC)² Cybersecurity Workforce Study.
CIO Business Intelligence
NOVEMBER 18, 2024
While cybersecurity has traditionally been under IT’s wing, many firms are revamping reporting structures to create a direct line from the chief information security officer to the CEO. This is recognition that security is a corporate function and covers all aspects of the business, not just the technology function,” Alkone says.
CIO Business Intelligence
FEBRUARY 11, 2025
After more than a decade leading the digital transformation and cybersecurity initiatives of the services company, hes managed to forge a synergy where tech and information security are established as fundamental pillars for business success. Another vertical of the plan is closely related to Industry 4.0
Network World
APRIL 25, 2017
That should mean the board wants to talk with you, the CISO, to learn firsthand what your department is doing to mitigate information security threats. Also on Network World: How to survive in the CISO hot seat +.
CIO Business Intelligence
SEPTEMBER 23, 2022
The practice brings together formerly separate disciplines of information security, business continuity, and disaster response (BC/DR) deployed to meet common goals. Organizations can’t just think about backup but [also about] how to do recovery as well. It’s not a one-size-fits-all approach,” Leech says.
Network World
SEPTEMBER 21, 2016
But you can get your arms around it if you assess the value of your data and focus your attention on protecting your mission-critical information assets — the crown jewels. Businesses must prioritize the protection of mission-critical information assets," says Steve Durbin, managing director of the ISF.
Network World
JUNE 14, 2016
With use cases to gather analytics around data, networks and user behaviors, there are endless possibilities for utilizing this information. But, when looking to drill down this data to inform security decisions, is a massive amount of information, which could include fall positives, really that useful?
CIO Business Intelligence
AUGUST 15, 2024
Most IT and information security leaders are very familiar with the term VUCA. Our conversation touched on what defines a great information security leader today and how those leadership attributes fuel results for the business. All they want to know is how to solve the problem.”
CTOvision
MAY 22, 2014
Organizations are giving more priority to development of information security policies, as protecting their assets is one of the prominent things that needs to be considered. So an organization makes different strategies in implementing a security policy successfully. Get Management Support. Write Policies. Implement policies.
CIO Business Intelligence
MAY 24, 2024
The exam covers topics such as information security risk management, the authorization and approval of information systems, as well as selecting, approving, implementing, assessing, auditing, and monitoring security and privacy controls.
Network World
MAY 31, 2016
Even organizations with security awareness programs in place struggle to instill strong security behaviors. Steve Conrad, managing director of MediaPro , a learning services company that specializes in information security, data privacy and compliance, says organizations can and should do better.
CIO Business Intelligence
SEPTEMBER 7, 2023
While we can’t plan for every new threat that AI poses, it’s imperative to have the right AI usage guardrails in place at Discover® Financial Services and know how to quickly address any vulnerabilities. Visit Discover Technology to learn more about Discover’s approach to security, AI, reliability and more.
Network World
AUGUST 4, 2016
At the Black Hat conference in Las Vegas, CSO’s Steve Ragan chats with Steven Grossman of Bay Dynamics about how companies can survive the avalanche of information security hype and buzzwords when speaking with vendors who are promising everything.
Network World
JUNE 8, 2016
After all, information security is no longer solely about managing firewalls and patch management, but rather a varied role encompassing business and technical skills. The CISO is a precarious job.
CIO Business Intelligence
JULY 13, 2022
Wrapping up the day, CN Assistant Vice-President and CISO Vaughn Hazen will share how to optimize investments in information security and the best ways to mitigate risk. On July 20, the summit begins by tackling an issue facing many security leaders: burnout. Check out the full summit agenda here.
Network World
JANUARY 9, 2017
How can you enforce internal policies and industry compliance mandates when there’s no longer an identifiable network perimeter?
Linux Academy
FEBRUARY 5, 2019
Wondering if information security is the right profession for you? I’ve been working in information security for many years and have had the opportunity to fill a variety of roles. In this post, I’ll fill you in about some of the available jobs in information security and what it takes to succeed in each one.
Network World
DECEMBER 29, 2016
The high-water line in information security gets higher each year. Just as we think we’ve finally figured out how to defend against attacks, then attackers come up with something new and we are right back to trying to figure out what to do next. For example, ransomware has surged in the last year.
CTOvision
DECEMBER 5, 2014
The infographic includes key insights on the manner and types of technology solutions government CIOs will leverage to accomplish mission goals, and recommendations on how Enterprise Infrastructure Management solutions providers can meet emerging client needs.
CTOvision
FEBRUARY 20, 2014
Recognized as a pioneer in the field of classified information protection, Mr. Bigman developed technical measures and procedures to manage the nation’s most sensitive secrets. Bigman worked in every area of information and data security, the last fifteen years as the Agency’s Chief Information Security Officer (CISO).
CIO Business Intelligence
DECEMBER 20, 2024
the early days of AI deployment, there was no well-known incident equivalent to the 2013 Target breach that represented how an attack might play out. So, how do you prevent your source code from being put into a public GitHub or GitLab repo or input to ChatGPT? The latter issue, data protection, touches every company.
CIO Business Intelligence
OCTOBER 24, 2024
One key reason is that CIOs and chief information security officers (CISOs) are not always aligned in how to enable productive, secure work. But in practice, IT and security teams often work separately, without common knowledge, data, goals, priorities, and practices.
CIO Business Intelligence
JULY 25, 2024
Information security leaders need an approach that is comprehensive, flexible and realistic. Leveraging AI to counter AI Security leaders are already grappling with how to use AI to defend against such attacks, to monitor employee usage of it, and protect the organization’s applications, including AI apps and models.
CIO Business Intelligence
JULY 25, 2024
IT security is a growing priority for businesses and the CISM certification is often required by government agencies hiring IT workers. This includes developing and maintaining cyber security programs, business analysis, strategic planning, and management tools.
Social, Agile and Transformation
OCTOBER 16, 2023
That was the topic at a recent Coffee with Digital Trailblazers, where we discussed how to evaluate, hire, and train entry-level employees in product management, DevOps, data science, marketing, information security, and other roles with high
CIO Business Intelligence
SEPTEMBER 22, 2022
Seeing that hackers don’t work 9 to 5, IT and information security professionals generally don’t get enough rest, says Itumeleng Makgati, group information security executive at Standard Bank. The experts share their four top tips below. . Encourage your teams to slow things down.
CIO Musings
NOVEMBER 8, 2014
Here are tips from me on how to do that. Here is how you and everyone around you can enjoy your vacation more. But how to approach it? HOW TO LEVERAGE GENERATIONAL DIVERSITY Never before have we had so much diversity in generations in the workforce. HERE’S WHY So how is it going? How do you know.
CIO Business Intelligence
MAY 16, 2022
McClurg is among the speakers at The Canadian CSO Future of Information Security Summit , taking place virtually May 18 and 19. Gathering security executives from a variety of industries across Canada, the summit will focus on mitigating risk and building market trust.
CIO Business Intelligence
OCTOBER 5, 2022
By Ashok Rutthan, Chief information security officer at Massmart. So retailers have the challenge of properly training a large number of full-time, part-time and seasonal staff, to ensure every employee is aware of risks and how to avoid them. Data and Information Security, IT Leadership And repetition is key.
CIO Business Intelligence
MAY 5, 2023
Robert Ford, vice president, enterprise strategy, at CoreStack will discuss how to unlock greater cloud value. Find out how to use generative AI to enhance customer experience at a presentation from Marci Maddox, research vice president for IDC’s Persuasive Content and Digital Experience Management Software Program.
Expert insights. Personalized for you.
We have resent the email to
Are you sure you want to cancel your subscriptions?
Let's personalize your content