Ranked #1
Zscaler's Global CISO Stan Lowe on Security as a Catalyst for Digital Transformation
Zscaler's Global CISO Stan Lowe on Security as a Catalyst for Digital Transformation
In one of the recent stops in this roundtable dinner seriers, ISMG and Zscaler visited Boston to discuss the role of sec... Read more
27 Jun 2019
•
Ranked #2
Analysis: Draft CCPA Regulations Fail to Clarify Ambiguities
Analysis: Draft CCPA Regulations Fail to Clarify Ambiguities
Draft regulations to carry out the California Consumer Privacy Act do not go far enough to clarify ambiguities in the la... Read more
22 Oct 2019
•
Ranked #3
Life Beyond Passwords: The Rise of Advanced Biometrics
Life Beyond Passwords: The Rise of Advanced Biometrics
Biometrics may be in fashion, but it's in part because users are ready, willing and able to use it to prove their identi... Read more
5 Jul 2019
•
Ranked #4
Taking Advantage of EMV 3DS
Taking Advantage of EMV 3DS
Numerous regulations and standards have been introduced globally to help curtail online fraud. What makes EMV 3D Secure ... Read more
19 Nov 2019
•
Ranked #5
Getting Ready for the NIST Privacy Framework
Getting Ready for the NIST Privacy Framework
By year's end, the National Institute of Standards and Technology should be ready to publish the first version of its pr... Read more
6 Nov 2019
•
Ranked #6
How 'Zero Trust' Better Secures Applications and Access
How 'Zero Trust' Better Secures Applications and Access
Organizations are accepting that the network perimeter no longer serves as the "ultimate defense" and thus adapting zero... Read more
17 Oct 2019
•
Ranked #7
Preparing for Potential Iranian 'Wiper' Attacks
Preparing for Potential Iranian 'Wiper' Attacks
In the wake of the killing of an Iranian general in a U.S. drone attack last week, organizations - especially healthcare... Read more
7 Jan 2020
•
Ranked #8
Identity as a Game-Changing Breach Defense
Identity as a Game-Changing Breach Defense
Often in breach response, security professionals focus on the technical aspects of the attack. Yet, the non-technical as... Read more
25 Jun 2019
•
Ranked #9
Reality Check: How Vulnerable Is the Power Grid?
Reality Check: How Vulnerable Is the Power Grid?
Is it possible that a nation-state actor such as Iran could create a cybersecurity incident that compromises the U.S. po... Read more
10 Jan 2020
•
Ranked #10
Threat Intelligence: Why Sharing Is Difficult
Threat Intelligence: Why Sharing Is Difficult
Cyber adversaries are resilient and move quickly, so it'st critical that organizations share threat intelligence in an a... Read more
9 Jul 2019
•
Ranked #11
CCPA Compliance: Identity Verification Challenges
CCPA Compliance: Identity Verification Challenges
One key step for preparing to comply with the California Consumer Privacy Act, which goes into effect in January, is det... Read more
12 Nov 2019
•
Ranked #12
Analysis: The Capital One Breach
Analysis: The Capital One Breach
The latest edition of the ISMG Security Report analyzes the root causes of the Capital One data breach. Also featured: b... Read more
2 Aug 2019
•
Ranked #13
Mobile Devices: Protecting Critical Data
Mobile Devices: Protecting Critical Data
Mobile devices are attractive targets for attackers because of messages, call logs, location data and more. State-sponso... Read more
31 Oct 2019
•
Ranked #14
Mastercard on the Evolution of Authentication
Mastercard on the Evolution of Authentication
Fraud schemes have migrated in recent years, exposing inherent vulnerabilities in how most organizations authenticate us... Read more
28 Jun 2019
•
Ranked #15
Analysis: The Latest Ransomware Trends
Analysis: The Latest Ransomware Trends
This edition of the ISMG Security Report features an analysis of the very latest ransomware trends. Also featured: Discu... Read more
22 Nov 2019
•
Ranked #16
Modified Draft CCPA Regulations: How They Impact Businesses
Modified Draft CCPA Regulations: How They Impact Businesses
In an in-depth interview, privacy expert Caitlin Fennessy sorts through modified draft regulations to carry out the Cali... Read more
26 Feb 2020
•
Ranked #17
IoT in Vehicles: The Trouble With Too Much Code
IoT in Vehicles: The Trouble With Too Much Code
The threat and risk surface of internet of things devices deployed in automobiles is exponentially increasing, which pos... Read more
16 Oct 2019
•
Ranked #18
A Close Look at HHS' Cyber Donation 'Safe Harbor' Proposals
A Close Look at HHS' Cyber Donation 'Safe Harbor' Proposals
Two rules proposed by federal regulators could provide significant help to strengthen cybersecurity in the healthcare ec... Read more
21 Nov 2019
•
Ranked #19
Analysis: Indictments in Equifax Hack
Analysis: Indictments in Equifax Hack
The latest edition of the ISMG Security Report analyzes the indictments of four Chinese military officers in connection ... Read more
14 Feb 2020
•
Ranked #20
Third-Party Risk Management: Asking the Right Questions
Third-Party Risk Management: Asking the Right Questions
An effective third-party risk management program starts with asking the right questions, says Brad Keller, chief strateg... Read more
28 Jun 2019
•