Remove eBook Remove Organization Remove Security Remove Survey
article thumbnail

5 Steps for Becoming a Business-Aligned Cybersecurity Leader

Tenable

Independent business risk study shows when security and the business are aligned around agreed-upon contextual data, they deliver demonstrable results. Folks, cybersecurity is broken. Security leaders are drowning in data. Because we're missing one key piece of information: business context. Here's how to get there.

Security 101
article thumbnail

What COVID-19 Response Strategies Tell Us About the Business-Cybersecurity Disconnect

Tenable

As organizations around the world raced to develop strategies to respond to the COVID-19 pandemic, an independent business risk study shows cybersecurity leaders were largely left out. Yet, many cybersecurity leaders are still struggling to get a seat at the table. . COVID-related scams were the No.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybersecurity Snapshot: IoT Vendors Fail at Vulnerability Disclosures, While Cyber Threats Again Top Business Risks 

Tenable

Also, check out a new toolbox for cybersecurity awareness programs. 1 - Cyber tops ranking of business risks – again Here’s further proof that business leaders are hyper aware about how devastating cyber incidents can be to their organizations. Then scan the latest list of top malware. And much more! The key to reducing risk?

IoT 52
article thumbnail

Does the Future of Work include Network as a Service (NaaS)?

CIO

The Future of Work and the Workplace is a 2023 Leesman survey report co-authored by HPE Aruba. How must organizations adapt? Many organizations can take advantage of these changes to modernize their technologies and infrastructure. What is the future of work and the workplace?

Network 254
article thumbnail

How Public Sector Organizations Can Overcome Today’s Cyber Risks

Tenable

Larry Ponemon and Tenable’s Stephen Smith discuss the cybersecurity challenges revealed in a recent study of cybersecurity in the public sector, and provide three tips for closing the Cyber Exposure gap. . It’s not easy to be a cybersecurity professional in the public sector these days. Limited technical resources and support.

article thumbnail

The 8 Best Practices for Reducing Your Organization’s Attack Surface

Ivanti

Increases in attack surface size lead to increased cybersecurity risk. Thus, logically, decreases in attack surface size lead to decreased cybersecurity risk. As with all things related to security and risk management, being proactive is preferred. How do I reduce my organization’s attack surface? Seems obvious, right?

article thumbnail

What is BCDR? Business Continuity and Disaster Recovery Explained

Kaseya

With organizations going through digital transformations and more employees working remotely, cybersecurity is a top priority for almost all IT teams. In fact, in the 2019 State of IT Operations Survey Report , nearly 61 percent of the survey respondents who had a security breach in the past year, had two to four IT outages.