cso_online

You can steal my identity, but not my behavior

Time is ripe for transition from identity to behavior based security model Leslie K. Lambert CSO | Apr 21, 2017 The compromise and misuse of identity is ...

FCW

The Identity Threat

Teri Takai www.fcw.com| Mar 21, 2017 Identity has always played in a central role in IT. Yet it is not often associated with security. That's probably ...

darkreading

Why Identity Has Become A Top Concern For CSOs

Saryu Nayyar www.darkreading.com| Feb 21, 2017 Seven of the world's top security leaders share their fears and challenges around the critical new role of identity in the ...

cso_online

Beyond Risk Scoring

Unlocking its full potential requires closed-loop responses Leslie K. Lambert CSO | Feb 14, 2017 Risk scoring is not an end in itself once it shows ...

cso_online

Have you seen her resume? 12 amazing women in security

By Kacy Zurkus, CSO | Feb 8, 2017 Female role models for young security newbs Female Entrepreneur of the Year Saryu Nayyar, CEO, Gurucul and author of the ...

salliemae-(350x120)

Sallie Mae Recognized for Cybersecurity Management Practices

Company Receives CSO50 Award for Developing and Implementing Security Initiatives NEWARK, Del.--(BUSINESS WIRE)--Sallie Mae (Nasdaq: SLM), the nation’s saving, planning, and paying for college company, ...

cso_online

Bridging the CIO and CISO Divide

Why identity and access management is at the core of the gulf between these two C-suite roles. Leslie K. Lambert CSO | Dec 7, 2016 ...