Evaluating MSSPs? Expel has accumulated a list of questions to ask during the evaluation process.
Here are 12 best questions you should consider asking any potential provider to help you determine which provider is the right fit for your organization.
Are you tasked with starting or improving the security processes within your organization?
Expel’s CISO, Bruce Potter, provides tips on how to do more with less, or improve a less-than-stellar legacy program.
Drive operational resilience with IT and security teams collaboration.
Remove the roadblocks to resilience.
When security and IT are working in harmony, they’re able to drive continuous improvement and use accurate and repeatable processes to customize playbooks and policies for smarter, automated responses...
A year ago, Chris Pierson and BlackCloak studied executives at top global pharma companies to learn the extent of password-based vulnerabilities. The findings weren't reassuring. Pierson revisited the study this year with a select few entities to see if the needle has moved in a more secure direction.
In a video...
As a cybersecurity leader, it's one thing to earn a seat at the senior management table, but it's quite another to find - and use - your voice in that role, says Alex Cunningham, CISO at Advisor360°, who discusses leadership and how to create a cybersecurity culture.
“What are we doing about Cybersecurity?”
This question unnerves even the most sure-footed IT leaders. Many would attribute such anxiety to uncertainty surrounding whether their investments are sufficient to secure their organization. Others would say their budget is insufficient to achieve the visibility they...
For years, organizations and IT professionals have turned to Microsoft’s PowerShell for its efficiency and ease of use.
It provides a well-integrated command-line experience for the operating system, and a simple way to manipulate server and workstation components. PowerShell is often treated as more secure than...
Antivirus (AV) software has generally been regarded by businesses as the best and simplest defense to keeping data and systems secure. That somehow, it is nearly unconquerable. In reality, while AV products are certainly a must-have in your security solutions suite, they do not provide 100% protection against...
As an international bank, Barclays needed to invest more in its information security training in order to minimize risk and ensure business continuity. The goal was learn and teach the modern way to minimize a security breach posed by the latest advanced threats.
Cyber sieges immerse teams in real-world cyberattack...
The day-to-day pressures of being a CISO are enormous and extend to matters far beyond those of incident response time. Meanwhile, traditional approaches to training cybersecurity team members have either been limited by scalability, lack of hands-on learning, or cost.
So, how much can Simulation-based Cybersecurity...
In theory, organizations are best protected by a layered security approach to cybersecurity based on best-in-class security tools.
In reality, the desired outcome is rarely achieved.
Why? Because most teams are not fully trained to use the technology on which their security program is built.
Download this...
Unemployment fraud incidents have spiked in the past year, and high-salaried senior executives are often the fraudsters’ victims. Dr. Christopher Pierson of BlackCloak describes how these scams are pulled off, what impact they have and how the CISO can bolster defenses.
"When a 20- or 30-person executive team is...
Only 13% of cybersecurity professionals had a cybersecurity education before getting into the sector, (ISC)2 reports, pointing to the need for extensive on-the-job training.
The new ESG Economic Validation 2020 report shows how to save money, find hidden threats faster, automate security investigations and optimize security workflows and tracking.
New encryption standards TLS 1.3 and DNS-over-HTTPS (DoH) will soon sweep away security controls. Security professionals must act within the next two years or they won't be able to analyze network traffic and detect cyberthreats.
Download the Forrester report —Maintain Security Visibility in the TLS 1.3 Era —...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.