Data loss prevention

Intrusion detection News

View All News

Intrusion detection Get Started

Bring yourself up to speed with our introductory content

View All Get Started

Evaluate Intrusion detection Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

View All Evaluate

Manage Intrusion detection

Learn to apply best practices and optimize your operations.

  • Dedicated CISO job still open to debate

    Almost 20 years after Citicorp decided to hire an executive-level security position dedicated to protecting its banking business, the responsibilities of the CISO job are still unclear to many business executives and open to discussion. Why do some companies still need convincing?

    As threats and infrastructure evolve at a fast pace, chief information security officers have to remain proactive in the face of ongoing digitization and globalization. In this issue of Information Security magazine, we look at the role's elevation and influence on broader security and risk management initiatives. Most importantly, we highlight accomplishments of dedicated chief security officers from different industries -- entertainment, financial services, healthcare, retail and technology -- and get their views on challenges in the CISO job and changes ahead.

    "The CISO has evolved from a technical security role to that of a corporate executive with a risk management focus," says Tim Callahan, senior vice president of global security and CISO at Aflac.

    Strategic security is an increasing responsibility of the CISO job. A growing number of security officers have implemented a threat intelligence capability to help steer the technical aspects of their security program. We talk to CISOs and other security experts about some lessons they've learned -- sometimes the hard way -- as they lead these efforts. The CISO job is tough, but those who are up to the challenge find great rewards.

     Continue Reading

  • Defense-in-depth strategy: Growing cyberthreat intelligence

    Cybersecurity defense in depth needs to learn from the military strategy it originated from. Expert Peter Sullivan explains where cybersecurity should not deviate. Continue Reading

  • Drawing business value from GRC analytics

    Governance, risk and compliance processes face numerous complications in the digital age. Companies' data volumes continue to grow exponentially, while information security threats and regulatory mandates constantly evolve. Digitization does have its GRC benefits, however. The vast amount of data stored by the average modern company presents a treasure trove of analytics information that can help prevent future security incidents and regulatory infractions. These GRC benefits extend to the rest of the business as well, potentially improving customer relations, streamlining resources and boosting the bottom line. In this handbook, learn how companies can draw business value from GRC analytics data and develop strategies to incorporate analytics best practices that will benefit company-wide business processes. Continue Reading

View All Manage

Problem Solve Intrusion detection Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close