Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Management & Strategy

Are You Playing Security ‘Elf on the Shelf’?

While your end users may act like children from time to time, your security practices shouldn’t treat them like they are. Gain visibility and control before being placed on the naughty list.

While your end users may act like children from time to time, your security practices shouldn’t treat them like they are. Gain visibility and control before being placed on the naughty list.

With the holidays rapidly approaching and 2013 coming to a close, I’ve been reading a variety of articles on topics such as, ‘The 10 biggest security issues of 2013,’ ‘What areas do CIOs/IT organizations under invest’ and a ‘How will security in the cloud and mobile change in 2014.’ As I read these stories, I am reminded of a little holiday tradition we have here at my house for our children – I’m sure some parents might do something similar.

Read the full Column at InfosecIsland…

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Google spinoff SandboxAQ has hired Chris Bates as its first CISO.

HackerOne CEO Marten Mickos announced that he will be retiring from the company after nine years.

Lou Serlenga has joined Bitsight as Chief Revenue Officer (CRO), following leadership roles at Tenable, Nile, and HPE.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...

Cybersecurity Funding

2022 Cybersecurity Year in Review: Top news headlines and trends that impacted the security ecosystem