Filter By:



Recent Blogs & Podcasts

Insights Portal


March 5, 2018 | Leadership Skills

 Overview of a Typical CISO Org Chart

The typical Chief Information Security Officer org chart includes an Infosec Executive Council and Deputy CISO reporting straight into the CISO, while roles such as security engineers, application security professionals and GRC employees report indirectly to the CISO.

Read More »

March 5, 2018 | Leadership Skills

 Key Members of an Information Security Executive Council

An information security executive council serves as an advisory group for the CISO and may have an internal and an external body. The advisory group ensures that information security functions align with organizational objectives and that policy and governance obligations are met.

Read More »

March 5, 2018 | Threats & Incidents

 Overview of Top Big Data Security Concerns in 2018

The top Big Data security issue is that sensitive data can be anywhere – and therefore everywhere – a concern that’s expressed by 34% of global and U.S. respondents. One related concern is that Big Data-generated reports could contain sensitive data (33% global and U.S.), while concerns over privacy regulations at 30% global round out the list of top issues.

Read More »

February 28, 2018 | Malware and Advanced Threats
By Joff Thyer, IANS Faculty

 Detect and Defend Against Fileless Malware

Never mind zero days. Fileless malware – which uses Windows tools like PowerShell and WMI to establish command-and-control channels and otherwise wreak havoc – is taking off in a big way. In this report, IANS Faculty Joff Thyer explains how fileless malware works, why it's becoming more rampant and the key steps to take to detect and defend against it.

Read More »