Home > Support > Blog
5 Common Mistakes that Well-Meaning CISOs Make

5 Common Mistakes that Well-Meaning CISOs Make

The chief information security officer (CISO) has a tough job. Because the CISO is responsible for overseeing the organization’s cybersecurity program, he or she takes the heat when the organization falls victim to a successful attack. Unfortunately, too many organizations have a culture that de-emphasizes cybersecurity, giving the CISO less of a voice in the board room and in budget considerations. It’s not surprising that the average CISO tenure is just two to four years.

Monday, July 15, 2019/Author: Paul Truitt, CISO & VP, Cybersecurity/Number of views (173)/Comments (0)/
Why Digital Transformation Is Putting Organizations at Risk

Why Digital Transformation Is Putting Organizations at Risk

In the rush to digital transformation, organizations are putting sensitive data at risk. Many are also struggling to implement proper data security as they embrace new technologies and multi-cloud deployments.

Monday, May 13, 2019/Author: Paul Truitt, CISO & VP, Cybersecurity/Number of views (150)/Comments (0)/
5 Ways SageNet’s Cybersecurity Team Provides Value

5 Ways SageNet’s Cybersecurity Team Provides Value

In its annual survey of IT professionals, Enterprise Strategy Group (ESG) asks about skills gaps that are impacting their organizations. Each year, cybersecurity tops the list of skills shortage, and the problem is getting worse. For the 2018-2019 survey, 53 percent of respondents reported cybersecurity skills gaps. That’s up from 51 percent in 2017, 45 percent in 2016 and 42 percent in 2015.

Thursday, March 07, 2019/Author: Paul Truitt, CISO & VP, Cybersecurity/Number of views (159)/Comments (0)/
Tip and Tricks for Enhancing IoT Security

Tip and Tricks for Enhancing IoT Security

The Internet of Things (IoT) is expanding rapidly — as are the security and privacy risks associated with it. One recent study suggests that nearly 20 percent of organizations have already suffered distributed denial of service (DDoS) attacks by IoT botnets. Gartner analysts say security concerns are inhibiting growth of the IoT.

Wednesday, September 19, 2018/Author: Paul Truitt, CISO & VP, Cybersecurity/Number of views (381)/Comments (0)/
Categories: Security Services
Understanding the ‘Shared Responsibility’ Model of Cloud Security

Understanding the ‘Shared Responsibility’ Model of Cloud Security

On June 12, 2017, security researchers discovered that the personal information of nearly 200 million American voters was left exposed to the Internet due to misconfigured cloud storage. The data, which included names, addresses, phone numbers, birthdates, party affiliation and other details, had been compiled by a firm called Deep Root Analytics on behalf of the Republican National Committee (RNC). More than 1.1 terabytes of sensitive data could be downloaded by anyone.

Monday, July 10, 2017/Author: Paul Truitt, CISO & VP, Cybersecurity/Number of views (1116)/Comments (0)/
Categories: Security Services
Tags:
RSS
1234