Cyber Security

When Michael Kolb got out of the Air Force in 2014, he found that his skills as a member of the bomb squad at MacDill Air Force Base didn’t translate easily into the civilian world. Related News/Archive Head of SOCom lays out vision at MacDill conference 4 Months Ago Students to visit MacDill; Maniscalco hosts […]

by

The days of CEOs regarding data protection technologies and staff as a budget drain and operating tax that stifles innovation are over. Galvanized by high-profile breaches, companies are shelling out more money to shore up corporate defenses. CEOs also recognize that security is table stakes for building digital products and are entrusting their CISOs with […]

by

It’s important that any alternative simplifies authentication. Companies and agencies don’t expect their employees to configure firewalls or actively manage encryption on their laptops; security controls have become increasingly automated over the last few years. But amidst these improvements, there’s one item that continues to get pushed down to customers and end-users: The burden of […]

by

It’s important that any alternative simplifies authentication. Companies and agencies don’t expect their employees to configure firewalls or actively manage encryption on their laptops; security controls have become increasingly automated over the last few years. But amidst these improvements, there’s one item that continues to get pushed down to customers and end-users: The burden of […]

by

It’s important that any alternative simplifies authentication. Companies and agencies don’t expect their employees to configure firewalls or actively manage encryption on their laptops; security controls have become increasingly automated over the last few years. But amidst these improvements, there’s one item that continues to get pushed down to customers and end-users: The burden of […]

by

As enterprises accelerate their use of cloud computing, online services, and ready themselves for internet of things deployments, they are finding themselves strained to find the cybersecurity talent and security tools needed to secure these efforts. That’s one of the most important takeaways from the Global State of Information Security Survey (GSISS) 2017 — a […]

by

What’s This? Government leadership and those chartered with creating budgets could benefit from applying sound value-management practices when considering the cybersecurity budget process. Tom Quillin, Intel Security’s CTO for security economics, contributed to this story.  Tony Scott, CIO for the federal government, recently commented that the federal funding process played a part in the Office of […]

by