cso_online

You can steal my identity, but not my behavior

Time is ripe for transition from identity to behavior based security model Leslie K. Lambert CSO | Apr 21, 2017 The compromise and misuse of identity is ...

FCW

The Identity Threat

Teri Takai www.fcw.com| Mar 21, 2017 Identity has always played in a central role in IT. Yet it is not often associated with security. That's probably ...

darkreading

Why Identity Has Become A Top Concern For CSOs

Saryu Nayyar www.darkreading.com| Feb 21, 2017 Seven of the world's top security leaders share their fears and challenges around the critical new role of identity in the ...

cso_online

Beyond Risk Scoring

Unlocking its full potential requires closed-loop responses Risk scoring is not an end in itself once it shows up color coded and normalized between 0 ...

cso_online

Have you seen her resume? 12 amazing women in security

By Kacy Zurkus, CSO | Feb 8, 2017 Female role models for young security newbs Female Entrepreneur of the Year Saryu Nayyar, CEO, Gurucul and author of the ...

Sallie Mae Recognized for Cyber Security Management Practices

Company Receives CSO50 Award for Developing and Implementing Security Initiatives NEWARK, Del.--(BUSINESS WIRE)--Sallie Mae (Nasdaq: SLM), the nation’s saving, planning, and paying for college company, ...

cso_online

Bridging the CIO and CISO Divide

Why identity and access management is at the core of the gulf between these two C-suite roles. The push and pull between the priorities of ...

ITSP Logo

17+ Female Founders & CEOs in Cybersecurity

IN CELEBRATION OF WOMEN’S ENTREPRENEURSHIP DAY NOVEMBER 19 On November 19, 2014, the inaugural Women’s Entrepreneurship Day (WED) was held at the United Nations in ...