Remove state-of-security people-processes-and-technology-the-triad-of-your-organizations-cyber-security
article thumbnail

Interview with Dr. Arun Vishwanath on the Latest Cybersecurity Attacks

CyberSecurity Insiders

We recently had the opportunity to interview Dr. Arun Vishwanath from his office in Buffalo, New York and discuss some of the recent high-profile security breaches and some of the urgent cyber security threats faced by governments and businesses. Their software development process was also weak.

article thumbnail

Leveraging Cybersecurity Strategy to Enhance Data Protection Strategy

BH Consulting

Data protection and privacy specialists (let’s use the term privacy professionals for simplicity) are some of the most well-qualified people I know – many with robust legal or compliance backgrounds. and I appreciate that most global privacy laws are typically technology agnostic – however their interpretation and implementation is not.

article thumbnail

Establishing Security Maturity Through CIS Cyber Defense Framework

McAfee

Introduction – Choosing the Right Security Controls Framework. Organizations are increasingly finding themselves caught in the “ security war of more ” where Governance, Risk and Compliance regimes, compounded by vendor solution fragmentation, have resulted in tick-box security.