In the last few years, the attack surface has changed from defending the perimeter to protecting applications in the cloud, leaving CISOs wondering how they can best allocate funds to stay ahead of attacks.
In the last few years, the attack surface has changed from defending the perimeter to protecting applications in the cloud, leaving CISOs wondering how they can best allocate funds to stay ahead of attacks.
To understand any businesses’ security posture, one must first understand the eight categories of cyber-security that is impacted: security intelligence, fraud, people, data, application, infrastructure, business partners and outsourcing, and threat intelligence. These topics serve as a great starting point for important discussions surrounding an organization’s security practice, with common security questions including: 1. What […]
The U.S. #department of commerce‘s National Institute of Standards and Technology (#nist) will award $3.6 million for three #pilot projects designed to make #online transactions more secure and privacy-enhancing for healthcare, government services, transportation and the Internet of Things. The three recipients of the National Strategy for Trusted Identities in Cyberspace (NSTIC) grants will pilot […]
Latest Comments