This edited extract is from How to Use Customer Data by Sachiko Scheuing ©2024 and reproduced with permission from Kogan Page Ltd. I have an extremely confidential piece of information on a particular ...
The management of information risk has become a significant topic for all organizations, small and large alike. But for the large, multi-divisional organization, it poses the additional challenge of ...
Model-Driven Security Engineering for Data Systems represents a structured methodology that integrates security into the early stages of system and database development. This approach leverages ...
Fulfilling the risk management and regulatory compliance obligations with consistency in today’s vastly disparate and complex IT enterprise environments has challenged CIOs to rethink the approach to ...
Information Security Architecture – Architect for choice I fully concur with, but Tom Scholtz’s definition of an Information Security Architecture is really what I would define as an overall ...
Every few years, the cybersecurity industry invents a new acronym to keep pace with innovation. We’ve seen Cloud Security Posture Management (CSPM) and Data Security Posture Management (DSPM). Now, as ...
At a recent seminar on information security management, I heard that FUD (fear, uncertainty and doubt) is dead, that ROI is dead and that the insurance model is dead. Information security needs to ...
At RSA Conference 2025, Cisco unveiled agentic AI capabilities in Cisco XDR, the latest version of Splunk SOAR, and an open-source AI security management model. Cisco today announced a range of ...
Healthcare organizations today face a wide range of escalating threats, including workplace violence, cyber intrusions, social unrest, and increasingly targeted acts against healthcare professionals ...
You might be using an unsupported or outdated browser. To get the best possible experience please use the latest version of Chrome, Firefox, Safari, or Microsoft Edge ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results