As a security professional, it’s time to take a fresh look at what your organization can do to compensate for insider negligence.
Being a highly-sensitive person (and why that's okay)
Are you a highly-sensitive person? Today's post is talking about why that is NOT a bad thing - and how to communicate with someone who is sensitive!
How to build a highly effective AI team
Four organizations share real-world insights into staffing a successful AI effort from the ground up.
How BranchOut Hit The Tipping Point and Grew From 1M to 5.5M Actives In 2 Months
At the start of 2012 BranchOut had just 1 million monthly active users. Then the professional networking app hired a dedicated growth team, launched a mobile..
How to Design & Execute a Highly Engaging Conference
User conferences are complex and highly-visible events that reflect on your organization's brand and reputation. With proper event design, enabled by current technology, organizations have the opportunity to not only overcome the logistical challenges, but to create highly-engaging user conferences The potential now exists to transform a one-size-fits-all event into a tailored, productive experience that ensures each participant achieves their goals, is delivered relevant content, and…
Why Is Active Open Enrollment Becoming the Popular Choice?
Employers and employees alike are shifting their preference to active open enrollment strategies. Here's why.
Why Healthcare Security Matters
Does it really matter if someone steals your healthcare records? What would a hacker do with that information? Sell it? To whom and for what purpose?
What Your Security Team Can Learn From the Olympics
Similar to the Olympics, a CSO or CISO needs to be able to lead their team and consider the impact they will have on the broader organization.
To Thwart Attackers, Measure What Matters
Accepting the reality that some attacks will get through, security effectiveness must be measured by how quickly we detect a compromise and stop the exploitation of that attack.
The 10 habits of highly effective marketing procurement managers
Here are 20 Chrome extensions that are available. This is just a sampling of what's out there and more extensions are being released all the time.
Network Virtualization and What It Means For Security
How does network virtualization differ from software defined networking (SDN) and network functions virtualization? And, more importantly, how does it impact network security?
Windows 10 Now on 300 Million Active Devices
Microsoft today announced that Windows 10 is now running on 300 million active devices around the world. Microsoft also shared some interesting stats related to Windows 10 usage. Read them below. Over 63 billion minutes were spent on Microsoft Edge in March alone, with 50% growth in minutes since the last quarter. Exclusively available on …
Cyber Attack on Power Grid Could Top $1 Trillion in Damage: Report
A major cyber-attack against the United States power grid would cause between $243 billion to more than $1 trillion in economic damage, according to a study.
Why Your Nonprofit Should be Active on Social Media
If you think of traditional advertising as the aforementioned megaphone, you can think of nonprofit social media as a round table conversation.
How Do You Define Prevention?
When considering a next-generation cybersecurity approach, proving how it has prevented threats can go a long way to securing additional funding in the future.
Hackers Behind Triton ICS Malware Hit Additional Critical Infrastructure Facility
The tools and TTPs used by the threat group behind the Triton/Trisis malware show that the hackers are focused on maintaining access to compromised systems.
Active-Active vs. Active-Passive Storage Controllers: Why Should You Even Care?
Which storage controller is right for you? Active-active or active-passive? Learn the differences in this blog.
Why you need to be active on Instagram
Instagram is now one of the most popular social media platforms in the world. Are you getting involved?