EDITORS' CHOICE 7 Tips for Choosing Security Metrics That Matter Experts weigh in on picking metrics that demonstrate how the security team is handling operational efficiency and reducing risk. Dealing With Insider Threats in the Age of COVID Dangerous gray areas like new BYOD policies and shadow IT devices have increased, thanks to the rapid shift to remote working. NEW FROM THE EDGE How AI Will Supercharge Spear-Phishing To keep pace with intelligent, unpredictable threats, cybersecurity will have to adopt an intelligent security of its own. Chart: The Pandemic Reprioritizes Security Projects Responses among IT and security pros reflect concern over vulnerabilities incurred by workers accessing the enterprise network from poorly protected home networks.
This virtual event offers a look at some of the newest and most prevalent types of online attacks targeted at enterprises. You'll get a look at some of the latest exploits used by today's cybercriminals, as well as their methods ...
All organizations have tools and strategies for keeping attackers out. But what if you could distract and frustrate attackers by making them *think* they've gotten your crown jewels? In this webinar, experts discuss emerging tools and strategies for cyber threat ...
Learn more about how today's IT operations teams work with cybersecurity operations, what technologies they are using, and how they communicate and share responsibility--or create risk by failing to do so.
Keep This Newsletter Out Of Your SPAM Folder Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.