How Do You Define Cybersecurity Success?

Security, regardless of type, has always been about preparing for the worst. It is a negative goal, where we work to prevent access to a file, system, or network by unauthorized actors.  The challenge is that we have to think of all the ways that a bad actor might gain access, including understanding vulnerabilities in the […]

7 Must-Read Identity Management & Cybersecurity Stories from January 2017

Top Stories on Digital Transformation, Identity Management, Governance, and How Cyber Attacks Begin in 91% of Companies Every two weeks we release a curated digest of the most interesting and informative articles covering Identity & Access Management, Cybersecurity, ICS/SCADA, compliance, privacy, and more across a range of industries. If you would prefer to receive this […]

4 Fundamental Steps to Cybersecurity Planning Success

“If you fail to plan, you are planning to fail!” – Benjamin Franklin Planning for cybersecurity success may be the biggest obstacle for any organization to overcome. Why? Because planning is usually treated as a ‘bolt-on’ measure and not given the attention it deserves. Done correctly, a plan serves as a framework to define the […]