Digital Transformation? How About a Security Transformation

In the rush to keep up with rapid changes and remain competitive—or even relevant—by transforming processes, many organizations might have neglected a key component of digital transformation: creating a strong cybersecurity program that defends them against the latest threats. This is a big mistake.  Data, especially personally identifiable information about customers and employees, intellectual property,…

How to Overcome the Great Security Skills Shortage

One of the biggest challenges facing cybersecurity leaders today is finding and retaining experienced and talented professionals for their teams. The skills gap, fueled by the simple fact that demand continues to outpace supply, has been an issue for years and shows no signs of going away any time soon. Research shows that the skills…

Rekindling the thrill of programming

We humans are a funny lot.  How quickly we go from being humbled by the improbable feat of human flight to being irritated by how long it takes at the airport.  We are routinely antagonized by traffic, but only occasionally amazed by the existence of a thing called an automobile. One of the most prominent…

Moving beyond usernames and passwords

In recent months, you may have noticed an uptick in two-factor and multi-factor authentication prompts, which are being used to verify consumer and business accounts. These tools are gaining more traction to help consumers and businesses protect against identity fraud, data breaches, password skimming, and phishing/ransomware attacks. Recent stats from the Identity Theft Resource Center…

Top 15 data management platforms

A data management platform (DMP) is a group of tools designed to help organizations collect and manage data from a wide array of sources and to create reports that help explain what is happening in those data streams. Deploying a DMP can be a great way for companies to navigate a business world dominated by…