Your trusted source for unbiased cybersecurity insight.
Having a clear and meaningful understanding of cyber security risk — such as one provided by a threat-informed and modeled security risk assessment — has
Security Risk Assessments Require Context To accurately understand security posture, context is needed. An organization must consider not only their controls, but also the most
Leveraging Threat Intelligence Simply put, we benefit when we think like a cyber-criminal and plan defenses around their tactics and attack methods. By leveraging threat
There are parts of every business considered to be critical to its ability to function. Email, accounting, and customer service are a few. Indeed, if
This article was originally published in the Open Forum of the ISSA Journal for September 2019. The Open Forum is a vehicle for individuals to provide opinions
Subscribe today to our free eNewsletter for security insights, exclusive invitations, and more.