FCW

The Identity Threat

Teri Takai www.fcw.com| Mar 21, 2017 Identity has always played in a central role in IT. Yet it is not often associated with security. That's probably ...

darkreading

Why Identity Has Become A Top Concern For CSOs

Seven of the world's top security leaders share their fears and challenges around the critical new role of identity in the fight against cyber adversaries. ...

CSO Online

Beyond Risk Scoring

Unlocking its full potential requires closed-loop responses Risk scoring is not an end in itself once it shows up color coded and normalized between 0 ...

CSO Online

Have you seen her resume? 12 amazing women in security

By Kacy Zurkus, CSO | Feb 8, 2017 Female role models for young security newbs Female Entrepreneur of the Year Saryu Nayyar, CEO, Gurucul and author of the ...

Sallie Mae Recognized for Cyber Security Management Practices

Company Receives CSO50 Award for Developing and Implementing Security Initiatives NEWARK, Del.--(BUSINESS WIRE)--Sallie Mae (Nasdaq: SLM), the nation’s saving, planning, and paying for college company, ...

gigaom

Machine Learning Proves Key to Privileged Account Protection

Behavioral analytics is quickly becoming the cornerstone of most every Infosec technology. However, it takes a lot more than simply analyzing user activity with rules ...

CSO Online

Bridging the CIO and CISO Divide

Why identity and access management is at the core of the gulf between these two C-suite roles. The push and pull between the priorities of ...

ITSP Logo

17+ Female Founders & CEOs in Cybersecurity

IN CELEBRATION OF WOMEN’S ENTREPRENEURSHIP DAY NOVEMBER 19 On November 19, 2014, the inaugural Women’s Entrepreneurship Day (WED) was held at the United Nations in ...

Open Gate Access

Pain in the PAM

Why privileged access management poses unique challenges Leslie K. Lambert CSO | Oct 11, 2016 In order to prevent security breaches, insider attacks and comply with ...