Making The Smart City Safe And Secure

Forrester IT

Composed of the internet of things, “smart cities,” aimed to optimize operations, present new security and privacy […]. government IoT security physical security security & risk digital transformation IoT Security & Risk

Translating Security For Small Business

Forrester IT

age of the customer security & risk #cyberinfluence #ciso CEO cybersecurity digital business digital strategy Security & Risk small business Zero TrustThis week is BlackHat. The annual Hacker Summer Camp as many folks call it.

Enterprise Meets Consumer Security: Exploring Approaches To Protect Employees At Home

Forrester IT

age of the customer cloud security content security cybersecurity data security endpoint security information security IoT security mobile security network security physical security privacy security & risk

Security & Risk 2019: Peering Into The Crystal Ball – Security Edition

Forrester IT

Security and risk pros have the opportunity to shape the future of technology and business in ways we might have only dreamed of two years ago. cybersecurity security & risk zero trust promoted

Fix your cloud security

David Linthicum

I found some interesting statistics in this RedLock article that illustrate the severity of the cloud security problem: Only 7 percent of businesses have good visibility of all critical data, and 58 percent say they only have slight visibility.

Maintain Your Security Edge: Develop And Retain Cybersecurity Talent

Forrester IT

cybersecurity information security retention management security & risk staff development & succession management Security & RiskAs an industry, we gripe about hiring and struggle with retention.

The Forrester Wave™: Managed Security Services Providers (MSSPs), Europe, Q4 2018

Forrester IT

I published my first Forrester Wave™ today, covering the managed security services provider (MSSP) market in Europe.

Recent HIPAA Settlements Highlight The Weaknesses In Healthcare Security

Forrester IT

security & risk cybersecurity healthcare Security & RiskHindsight is 20/20; it’s easy to look back on past mistakes and identify ways to prevent them from reoccurring, especially when it comes to breaches reported on the Office of Civil Rights (OCR) “Wall of Shame”.

The Security And Privacy Implications Of Drones

Forrester IT

Yet while drones introduce a range of use cases, the growth of drones also represents a new physical threat that demands the attention of security […]. age of the customer security & risk Drones emerging technology Physical Security Security & Risk

Our Security Recommendations Will Help You Handle The Worst Of What 2019 Throws At You

Forrester IT

Today we released our 2019 Security & Risk Recommendations report. We collected contributions from our colleagues across the Forrester Security & Risk team to identify the most important actions security leaders should take in 2019.

PSD2 Security Requirements Are Restricting Fintech Innovation

Forrester IT

I have recently released a new report looking at the second phase of the Payment Services Directive (PSD2) and its security requirements along with my colleagues Jacob Morgan and Andras Cser. age of the customer banking financial services security & risk

Gartner Top 10 Security Projects for 2019

CEB IT

When George took over as the CISO of a retail company, IT security was relatively simple. But as the organization has grown — adding online ordering, more employees and a host of cloud-based platforms and technology to support digital business across the organization — so have the security vulnerabilities. Plus, increased attacks and phishing attempts make it difficult to know what security projects to focus on and where to get the most ROI. Project 9: Container security.

Gartner Keynote: Leverage Automation for Modern Security

CEB IT

When Amy, the CISO of a healthcare provider, looked at cloud security across the enterprise, she realized the default access control models were creating a variety of access issues. BeWell’s infrastructure as a service (IaaS) providers defaulted to a secure state, allowing only the owner access. We’re now being asked how we’re helping the enterprise realize more value while assessing and managing risk, security and even safety. Security

Security So Simple A 10-Year-Old Can Do It

Forrester IT

age of the customer security & risk IAM identity and access Security & Risk Zero TrustIt’s the summertime, and my daughters are home from school.

The Security Snapshot: 10-Year Challenge

Forrester IT

Besides the security concerns of social media sites potentially mining […]. security & riskAt the start of the new year, a meme called the 10-Year Challenge went viral.

New Tech Spotlight: Security Technology Takes Center Stage

Forrester IT

Venture capital and private equity spending on security technology reached an all-time high in 2018. While that total may pale in comparison to other fast-growing markets such as fintech ($124B) or transportation tech ($150B), consider that 65% of that $31B in security has […].

White House Staffers Can't Use Personal Smartphones Anymore, and More Security News This Week

The Investing Edge

Meltdown and Spectre, dossier drama, and more of the week's top security news. Security

Using Secure Configurations | Standardize Your Security

Linux Academy

This week, we’re discussing secure configurations, and why they matter. Our friends at the Center for Internet Security (CIS) listed “Secure Configurations” as the No. 5 most important security control on this year’s Top 20 hit list.

Security & Risk 2019: Cybersecurity’s Staffing Shortage Is Self-Inflicted

Forrester IT

Unless this is your first day working in cybersecurity, you’ve heard numerous times that we have a hiring crisis — there aren’t enough people to fill the need for security talent. Current projections show that we will have nearly two million job vacancies in the security sector by 2022. Fixing this will require changes to the way we hire, train, and retain security pros. cybersecurity security & risk talent management promoted

The Security Snapshot: Shaping The New Cybersecurity Culture

Forrester IT

However, 22% of security decision makers note their team being understaffed as one of their biggest security challenges. All managers understand that both recruiting top talent as well as crafting a winning team and company culture is crucial to high performance.

Security Frameworks…Useless?

Doctor Chaos

I was recently in a very high-cost (around $6K), one-week security course in San Francisco. You can infer the institution. The instructor was dynamic, and the topic was focused on technical hacking. A how-to for breaking into computers, detecting the break-in, etc. At the end of the week there was a little ‘capture the flag’ […]. InfoSec compliance framework NIST PCI

Gartner Top 7 Security and Risk Trends for 2019

CEB IT

Creating simple, practical and pragmatic risk appetite statements enabled this CISO to break down the cultural disconnect that existed between the security team and the different business units. This is one of seven security and risk management trends that Gartner expects to impact CISOs in 2019. 2: There is renewed interest in implementing or maturing security operations centers (SOCs) with a focus on threat detection and response. Security

Trends 156

Fugue: Autonomous Cloud Security and Compliance

CTOvision

Fugue automates enterprise cloud security and compliance enforcement to prevent data breaches, policy violations, and system downtime. Fugue ensures cloud infrastructure stays in continuous compliance with enterprise security policies.

Getting started with a career in Cyber Security and Information Security

Doctor Chaos

The Information Security Profession – Where do I Start? I am often asked by individuals to provide advice or guidance on how to get started in the field of information security. Cyber InfoSec education infosec security awareness tools training

Cyber security a business necessity

Computer Weekly

Cyber security is a business necessity, according to the T-Mobile security chief in Poland

Mobile 204

Security Budgets In Asia Pacific, 2019

Forrester IT

APAC is a unique region in its cultural, geographic, regulatory, security maturity and economic diversity. It has taken me 15 months and a LOT of travel, listening and talking to feel confident enough to write this research for APAC.

Budget 197

Top Security Technology Trends in 2019: Transforming the Future of Work in Security

Forrester IT

Walk the show floor at any security event and you will be inundated with a multitude of purportedly cutting-edge and disruptive security technologies. When every vendor claims that their solution is unique, and that no security program would be complete without it, how do you cut through the noise to pinpoint what you must pay […].

Trends 156

Cloud Security Spending Will Grow To $3.5 Billion By 2021

Forrester IT

What does this mean for cloud security? · This rapid shift to the cloud raises new issues and challenges for security and risk professionals. Traditional perimeter-based security tools do little to protect cloud workloads. Securing data and applications that reside in the cloud is increasingly critical as more mission-critical apps and high-value data and intellectual property move to the cloud. Cloud Security. cloud access security brokers.

5 Security Questions Your Board Will Definitely Ask

CEB IT

How secure are we? Why do we need more money for security, when we just approved X last year? Chances are, most security and risk leaders have heard these questions, possibly multiple times, from their boards of directors. Are we 100% secure? Boards today are more informed about security risk, with just 15% of directors reporting their boards have very little to no knowledge of cyberrisk, down from 22% in 2015. What it sounds like: Are we 100% secure?

IoT security window closing

Computer Weekly

The window of opportunity for addressing security risks in internet of things devices is closing rapidly, according to Intel's IoT security manager

Cloud security: The essential checklist

David Linthicum

Cloud security is one of those things that everyone knows they need, but few people understand how to deal with. I The good news is that it’s actually pretty simple, and somewhat similar to security for your enterprise systems. Note that you need to deal with security at the directory level as well, so the directory itself does not become a vulnerability. Security ops. Often overlooked, this is the operational aspect of all of security.

More reasons to put secure data in the public cloud

David Linthicum

This should surprise no one, considering the amount of core business assets that are being pushed to the cloud now, as well as the amount that security providers are spending on cloud. The worldwide market for cloud intrusion protection software is projected to grow by $1.8

Cloud Security Alliance DC Update: Explore The Boundary of Security & Privacy on 13 June Cruise

CTOvision

The Boundary of Security & Privacy Privacy is becoming an ever increasing concern in our world today. Social Networks today are now focusing on users’ privacy given the inherent security risks posed by organizations’ access to personally identifiable information. Cloud Computing Cyber Security NewsThe European Union has enacted GDPR valuing privacy whereas on the opposite end of the spectrum, […].

Embrace Gender Diversity in Security and Risk Management Roles

CEB IT

For every 100 security and risk management (SRM) executives, only about a quarter of them are women. The Gartner Gender Diversity in Security and Risk Management Survey explored how gender diversity impacts the ability of an organization to manage its security and risk management objectives. Early exposure to security and risk management disciplines develops more qualified candidates and provides professional support for gender parity.

Security technology and online casinos

Doctor Chaos

Online casinos and playersare at risk from a wide number of security threats £7.5 InfoSec casino infosec security awareness