By Carl Herberger, VP Security Solutions, Radware So, let’s say you are up to no good and motivated to attack somebody or some organization. After somewhat thoughtful considerations you decide you are going to launch a cyberattack to render your victim unavailable or to extort some sort of action or ransom. However, you have a […]
CXO THOUGHTS
-
-
The Enemy You Know: An Analysis of the Insider Threat
By Ted Harrington, Executive Partner, Independent Security Evaluators Many organizations are cognizant of the fact that security threats can originate from the inside, beginning with their own trusted employees and partners. However, many do not differentiate between the various types of internal adversaries and are unaware that different defense strategies are required to thwart each […]
by itenter1-ca -
How will we ever get our work done? A CIO’s perspective
By Curt Kwak, Chief Information Officer, Proliance Surgeons Healthcare is an interesting industry for IT professionals. It’s an industry that wants to depend on technology for clinical excellence & improving the health of our population, yet, there are so many obstacles to overcome to really get there. So, how do we get “there”? I serve […]
by itenter1-ca -
Security Through Maturity
By Sedar M.T. LaBarre, Vice President, Booz Allen Hamilton Prevent Your Supply Chain From Becoming a Cyber Attack Chain Hidden Risks and Higher Expectations Supply chain functions have traditionally been seen as internal operations— something that happened behind the scenes for customers, as long products were delivered on time and in good condition. But that’s starting […]
by itenter1-ca