Afternoon Cyber Tea: Cybersecurity & IoT: New risks and how to minimize them

Credit to Author: Jim Flack| Date: Thu, 02 Jul 2020 16:00:59 +0000

Every year billions of new connected devices come online. These devices enable businesses to finetune operations, optimize processes, and develop analytics-based services.

The post Afternoon Cyber Tea: Cybersecurity & IoT: New risks and how to minimize them appeared first on Microsoft Security.

Read more

CISO Stressbusters: Post #2: 4 tips for getting the first 6 months right as a new CISO

Credit to Author: Jim Flack| Date: Tue, 23 Jun 2020 18:00:17 +0000

CISO Stressbusters: CISO guidance and support from around the world.

The post CISO Stressbusters: Post #2: 4 tips for getting the first 6 months right as a new CISO appeared first on Microsoft Security.

Read more

Operational resilience in a remote work world

Credit to Author: Jim Flack| Date: Mon, 18 May 2020 16:00:55 +0000

Cybersecurity provides the underpinning to operationally resiliency as more organizations adapt to enabling secure remote work options, whether in the short or long term.

The post Operational resilience in a remote work world appeared first on Microsoft Security.

Read more

Why CISOs Are Demanding Detection and Response Everywhere

Credit to Author: Leah MacMillan| Date: Tue, 14 Apr 2020 09:44:56 +0000

Over the past three decades, we’ve had time at Trend Micro to observe the industry trends that have the biggest impact on our customers. And one of the big things we’ve seen is that threats move largely in tandem with changes to IT infrastructure. This matters today because most organizations are transforming the way they…

The post Why CISOs Are Demanding Detection and Response Everywhere appeared first on .

Read more

Protecting your company during COVID-19: guidance for CIOs and CISOs

Credit to Author: Ross McKerchar| Date: Wed, 01 Apr 2020 13:42:00 +0000

An unplanned and rapid shift to remote working is inadvertently forcing companies to relax cybersecurity controls. CIOs and CISOs must work quickly to counter the risks before the criminals capitalise on them.<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/_vdQUqr8bs8″ height=”1″ width=”1″ alt=””/>

Read more