John Scimone serves as SVP, Chief Security Officer for Dell Technologies, where he leads the company’s global corporate security program. Data shows that our organization is a bit of an anomaly. As ...
In a world where cyber threats continue to grow in complexity and quantity each year, threat modeling is one of the most advantageous and practical tools organizations can use to shore up security.
Kiteworks recently released findings from its AI Data Security and Compliance Risk Survey of 461 cybersecurity, IT, risk management, and compliance professionals. The survey, which was conducted by ...
The data in these reports is gleaned from ransomware leak sites, which we monitor to better understand the overall velocity of attacks and related trends. For 2023, the big takeaway is the spike in ...
Secure configurations are a key best practice for limiting an organization’s cyber vulnerabilities. Since systems don’t ship securely, it’s important to review and implement recommended guidance.
One of the most challenging endeavors for any organization is the implementation of an enterprise resource planning (ERP) system. For chief information officers (CIOs) and other top executives, this ...
Implement a zero trust security model with confidence with these best practices and tool suggestions to secure your organization. A couple of years ago, organizations relied heavily on the traditional ...
The Department of Veterans Affairs “continues to face significant challenges” in complying with the Federal Information Security Modernization Act—or FISMA—according to an audit released by the VA ...
Every aspect of technology selection, deployment and management has changed over recent years. Our networks are increasingly distributed. Applications that once would never have been ‘outsourced’ are ...
Attackers can spread through networks in about 48 minutes on average, and sometimes in under a minute. The time available for ...