Remove eBook Remove Security Remove Strategy Remove Survey
article thumbnail

What COVID-19 Response Strategies Tell Us About the Business-Cybersecurity Disconnect

Tenable

As organizations around the world raced to develop strategies to respond to the COVID-19 pandemic, an independent business risk study shows cybersecurity leaders were largely left out. Yet, many cybersecurity leaders are still struggling to get a seat at the table. . COVID-related scams were the No.

article thumbnail

5 Steps for Becoming a Business-Aligned Cybersecurity Leader

Tenable

Independent business risk study shows when security and the business are aligned around agreed-upon contextual data, they deliver demonstrable results. Folks, cybersecurity is broken. Security leaders are drowning in data. Because we're missing one key piece of information: business context. Here's how to get there.

Security 101
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybersecurity Snapshot: IoT Vendors Fail at Vulnerability Disclosures, While Cyber Threats Again Top Business Risks 

Tenable

Also, check out a new toolbox for cybersecurity awareness programs. The report, now in its 12th year and based on a survey of 2,712 risk management experts from 94 countries and territories, found that cyber risk also ranks first among small business worries. Plus, businesses again rank cyber risk as their top concern. And much more!

IoT 52
article thumbnail

Does the Future of Work include Network as a Service (NaaS)?

CIO

The Future of Work and the Workplace is a 2023 Leesman survey report co-authored by HPE Aruba. Additionally, NaaS enables the ability to flex down requirements should real estate space strategies change. The report explores the critical questions on the minds of business leaders coming out of the pandemic today. Networking

Network 254
article thumbnail

The 8 Best Practices for Reducing Your Organization’s Attack Surface

Ivanti

Increases in attack surface size lead to increased cybersecurity risk. Thus, logically, decreases in attack surface size lead to decreased cybersecurity risk. As with all things related to security and risk management, being proactive is preferred. Reduce your cybersecurity attack surface by reducing complexity.

article thumbnail

What is BCDR? Business Continuity and Disaster Recovery Explained

Kaseya

With organizations going through digital transformations and more employees working remotely, cybersecurity is a top priority for almost all IT teams. In fact, in the 2019 State of IT Operations Survey Report , nearly 61 percent of the survey respondents who had a security breach in the past year, had two to four IT outages.

article thumbnail

Upskilling And Reskilling: Ready To Future-Proof Your Workforce?

Hacker Earth Developers Blog

One example of reskilling in the tech world is when a software developer decides to transition to a career in cybersecurity. To overcome this challenge, IBM decided to launch a program called the Skills Initiative that aimed to train and retrain IBM employees in high-demand skills, such as cloud computing, data analytics, and cybersecurity.