Guide to Operationalizing Zero Trust

Credit to Author: Alifiya Sadikali| Date: Tue, 11 Jul 2023 00:00:00 +0000

Zero Trust is no longer a buzzword but an essential element in enterprise security architecture. Operating on the ‘never trust, always verify’ principle, Zero Trust plays a vital role in protecting enterprise assets and data. However, operationalizing Zero Trust can be challenging for businesses.

Read more

Cybersecurity Awareness Training to Fight Ransomware

Credit to Author: Jon Clay| Date: Thu, 06 Jul 2023 00:00:00 +0000

Advanced technologies allow organizations to discover, assess and mitigate cyber threats like ransomware. But truly strong cybersecurity also requires a threat-aware workforce—prompting more and more enterprises to focus on cybersecurity awareness training and testing.

Read more

How to Write a Cybersecurity Policy for Generative AI

Credit to Author: Greg Young| Date: Thu, 22 Jun 2023 00:00:00 +0000

Just months after hitting the scene, generative AI already seems like it will become a permanent addition to the enterprise IT toolbox. For CISOs, the pressure is on to roll out AI security policies and technologies that can mitigate very real and present risks.

Read more

Ransomware Insurance: Security Strategies to Obtain Coverage

Credit to Author: Vince Kearns| Date: Tue, 13 Jun 2023 00:00:00 +0000

Ransomware accounts for 75% of all cyber insurance claims, yet 40% of business currently lack the coverage needed. Discover security strategies to help you meet ransomware insurance requirements.

Read more

Generative AI: What Every CISO Needs to Know

Credit to Author: Greg Young| Date: Thu, 01 Jun 2023 00:00:00 +0000

New technologies always change the security landscape, but few are likely to have the transformative power of generative AI. As platforms like ChatGPT continue to catch on, CISOs need to understand the unprecedented cybersecurity risks they bring—and what to do about them.

Read more

Against the Clock: Cyber Incident Response Plan

Credit to Author: Chris LaFleur| Date: Wed, 24 May 2023 00:00:00 +0000

Conventional wisdom says most organizations will experience a cybersecurity breach at some point—if they haven’t already. That makes having a ready-to-launch incident response process crucial when an attack is detected, as this fictionalized scenario shows.

Read more

Accelerating Security Risk Management

Credit to Author: Mike Milner| Date: Thu, 18 May 2023 00:00:00 +0000

In response to the expanding attack surface, Mike Milner, Trend Micro VP of Cloud Technology, explores the role security risk management plays in this new era of cybersecurity and how IT leaders are accelerating innovation.

Read more