How long is a piece of string? The challenges and benefits of benchmarking security culture

Email not displaying correctly? View it in your browser.

CSO

CSO After Dark

Mar 30, 2016
Featured Image

9 tips to prevent you from falling for a tax scam

Tyler Moffitt, senior threat research analyst at Webroot, provides tips for staying secure this tax season. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

How long is a piece of string? The challenges and benefits of benchmarking security culture
How to set up a portable, non-cloud-based password manager
A healthy dose of skepticism never hurt a security professional
Top 10 DBaaS security concerns

Video/Webcast: Striim

8 Priorities for Modernizing Your Data Integration and Analytics Strategy

Big data. Streaming data. Fast analytics. Cloud processing. Storage. IoT. These are just some of the innovative ways technology is changing. But which technologies will deliver real business value? Read More

Thumbnail Image

How long is a piece of string? The challenges and benefits of benchmarking security culture

Measuring security culture is challenging, but increasingly important to information security as we seek to maximize the value of people as well as technology to protect organizations. Asking how a security culture stacks up is like asking, "how long is a piece of string?" It depends on how you measure it, against itself or against an external baseline. The main point is to find cultural metrics that help you better understand and improve your enterprise security posture. Read More

Thumbnail Image

How to set up a portable, non-cloud-based password manager

Setting up a non-cloud based password manager in which the password database can be accessed from more than one device is easier than it sounds. Read More

Thumbnail Image

A healthy dose of skepticism never hurt a security professional

Whether you are in an entry-level position or have years of experience under your belt, there are always lessons to learn in the ever changing threat landscape of cybersecurity. Read More

Thumbnail Image

Top 10 DBaaS security concerns

Survey shows the worries users have of their databases in the cloud. Read More

Video/Webcast: EMA Research

Achieving Hi-Fidelity Security by Combining Packet and Endpoint Data

Join David Monahan, research director of security & risk management at EMA, April 26th @11AM PDT/ 2PM EDT as he discusses report findings on how organizations are using endpoint records and network packets. Read More

Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO After Dark as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.