for the Record

CAN HEALTH CARE TRUST ITS SECURITY PRACTICES?

By Lee DeOrio (Lee DeOrio is editor of For The Record) June 21, 2017 What’s a day in health care without news of another data ...

infosecurity

Insider Threat Detection in a Borderless World

Saryu Nayyar www.infosecurity-magazine.com | June 14, 2017 The wide scale adoption of hybrid data center and cloud IT infrastructures is creating new security gaps, risks and ...

darkreading

Why Compromised Identities Are IT’s Fault

Saryu Nayyar www.darkreading.com| June 8, 2017 The eternal battle between IT and security is the source of the problem. The compromise and misuse of identity credentials provides ...

cso_online

You can steal my identity, but not my behavior

Time is ripe for transition from identity to behavior based security model Leslie K. Lambert CSO | Apr 21, 2017 The compromise and misuse of identity is ...

FCW

The Identity Threat

Teri Takai www.fcw.com| Mar 21, 2017 Identity has always played in a central role in IT. Yet it is not often associated with security. That's probably ...

darkreading

Why Identity Has Become A Top Concern For CSOs

Saryu Nayyar www.darkreading.com| Feb 21, 2017 Seven of the world's top security leaders share their fears and challenges around the critical new role of identity in the ...

cso_online

Beyond Risk Scoring

Unlocking its full potential requires closed-loop responses Leslie K. Lambert CSO | Feb 14, 2017 Risk scoring is not an end in itself once it shows ...

cso_online

Have you seen her resume? 12 amazing women in security

By Kacy Zurkus, CSO | Feb 8, 2017 Female role models for young security newbs Female Entrepreneur of the Year Saryu Nayyar, CEO, Gurucul and author of the ...

salliemae-(350x120)

Sallie Mae Recognized for Cybersecurity Management Practices

Company Receives CSO50 Award for Developing and Implementing Security Initiatives NEWARK, Del.--(BUSINESS WIRE)--Sallie Mae (Nasdaq: SLM), the nation’s saving, planning, and paying for college company, ...