Cyber Security DE:CODED podcast

Improve productivity by slowing down your email

Manage teams better by delaying your email! Improve productivity by slowing down your email. Email programs increasingly include the ability to schedule your emails. You can choose when they are sent – ...

Why Overthinking Risk Will Turn You into Stone

Why Overthinking Risk Will Turn You into StoneRisk is an enabler of Analysis Paralysis.Organizations invest vast amounts of money, time, and human capital in identifying, analyzing, and reporting potential risks within their ...
Grappling with the Unpredictable Second-Order Effects of LLM

Grappling with the Unpredictable Second-Order Effects of LLM

Yogi Berra was (among other things) an incredible quote machine, and he’s often credited with the following gem: “It’s tough to make predictions, especially about the future.” Yes indeed. Seeing how the ...

Crawl, Walk, Run: How to Kickstart your Insider Risk Program

Insider risk incidents are on the rise, and critical infrastructure is increasingly being targeted. As 2023 nears, we believe establishing an Insider Risk Program should be a top priority. Off the back ...
cybersecurity ask chloé career project management business security

Survey Reveals Limits of CISOs’ Management Experience

A global survey from recruitment firm Marlin Hawk that polled 470 CISOs at organizations with more than 10,000 employees found nearly half (45%) have been in their current role for two years ...
Security Boulevard
kiosk

Reimagining Digital Kiosk Security

| | iot, kiosk, management, retail, security
The digital age is truly an exciting time. Technology is altering the way we work, our interactions and even our experiences. In today’s world, where competition is fierce, the edge that such ...
Security Boulevard

Introducing DTEX System’s Enhanced Global Partner Program

| | Dtex, insider threat, management
Insider threat management matters now more than ever, which is why we’re excited to officially announce the launch of DTEX’s enhanced Global Partner Program. The change from in-person to remote working due ...

UK Construction: Cybersecurity Experts Defend Joint Ventures

After years of falling behind, the construction industry has realised the importance of its data. Construction-related businesses invested a remarkable 188% more in cybersecurity in 2018–19. Data leaks and cyberattacks have jolted ...

Understanding Behavioral Intent Doesn’t Equal Invasive Surveillance

One of the realizations of the pandemic-forced Work-From-Anywhere (WFA) movement, and the subsequent “great resignation” (and great data infiltration), for security professionals is the need to understand user behavior better. WFA forced ...

CIS Control 15: Service Provider Management

Enterprises today rely on partners and vendors to help manage their data. Some companies depend on third-party infrastructure for day-to-day operations, so understanding the regulations and protection standards that a service provider ...