The big change of zero trust can be intimidating to some, but security leaders can tailor their communication to make the shift more palatable.
Cybersecurity Minute
Small- and medium-sized businesses can stay current on the latest threats and detect and prevent attacks with tailored threat intelligence data by leveraging open-source platforms, tools, and communities.
Security teams can assist with financial automation projects that often require third-party tools. Rob Wood has some tips on how to select them.
Rob Wood explains how organizations can avoid complications from compliance and other requirements in financial automation projects.
If security professionals are going to position themselves as enablers to the business, then they must invest in the CISO-CFO relationship.
There are some practical steps that organizations can take to implement important data governance, says Frank Domizio.
MITRE’s new System of Trust risk model manager and a community engagement group introduces another great resource for software supply chain security and risk management.
Metrics are a critical part of implementing zero trust.
Grip Security addresses the challenges of SaaS security by providing tailored insights and an agentless deployment mechanism among other advantages.
There are many benefits to using the zero trust maturity model as a framework for cybersecurity planning and implementation, say Rob Wood.
Multi-cloud incident response is more complex than traditional incident response. Frank Domizio explains how and why organizations need to adapt.
Contextualize what you need from data teams, so that they understand the why behind your ask, Rob Wood advises, as a way to build stronger relationships.
Rob Wood looks at why pinpointing the right data, and reaching consensus between data and security teams on that data, is critical for reducing risk.
To implement zero trust, business leaders should know a cultural shift is required along with investment in the right tools and resources.
Strong relationships between the CISO, the chief data officer, and the others involved with data will strengthen an organization’s data strategy, says Rob Wood.
Rob Wood explains why security teams need to be trained to assess risk and maintain compliance across different clouds.
Endor Labs released a report that identifies the top 10 open source software risks, including known vulnerabilities, compromised legitimate packages, untracked dependencies, and more. Chis Hughes explains.
To get the most out of training for multi-cloud environments, it’s important to vary the kinds of training offered to suit different learning styles, according to analyst Rob Wood.
The zero trust security framework can protect sensitive data from evolving cyber threats, says Frank Domizio.
There’s a lot of complexity that goes into managing different cloud services. Here’s what you need to know before embarking away from a single cloud setup.