Information Security

Home/News & Thought Leadership/Information Security
  • Abstract illustration of toxic data and security insights engineers

Toxic data: You own it…unless you can prove you don’t

2023-01-30T15:22:54-05:00

Data is a valued asset that can propel growth. How you collect and store it can create a risk profile you don’t fully understand—with potentially negative consequences. That’s why you need to assume you have toxic data until you can prove you can’t.

Toxic data: You own it…unless you can prove you don’t2023-01-30T15:22:54-05:00
  • Photo of professor depicting cybersecurity basics doesn;t have to be complicated.

Remember the basics: Cybersecurity 101

2022-12-06T12:47:09-05:00

As protecting data becomes more challenging and complex, with new tools being introduced to the market seemingly daily, three simple, core cybersecurity basics remain the best weapon to combat threats.

Remember the basics: Cybersecurity 1012022-12-06T12:47:09-05:00
  • Information security team reviewing governance pyramid

Three Elements that Complete the Governance Pyramid

2023-01-30T14:40:35-05:00

The governance pyramid is built bottom-up with policy, standards, process, procedures, and guidelines. To be effective, the structure needs to be organized, consistent, and aligned with to policy and business need.

Three Elements that Complete the Governance Pyramid2023-01-30T14:40:35-05:00
  • Photo of CISO discussing security as a process and reviewing information classification with team

What is SAAP? It is Security as a Process

2023-01-30T14:16:13-05:00

Security as a Process (SAAP) and the classification of information is fundamental to information security. This article, the second in a three-part series, looks at the "how" of information security and why it is so important.

What is SAAP? It is Security as a Process2023-01-30T14:16:13-05:00
  • Photo of CISO discussing security as a process and reviewing information classification with team

The Secrets Behind Information Security Organization

2023-01-30T14:39:33-05:00

Information security is a multifaceted field, covered with tempting baubles and sharp thorns. However, the unifying framework upon which the whole field is suspended is governance. This article, the first in a three-part series, looks at standards and policy—from why policies are needed and what needs to be done to support them.

The Secrets Behind Information Security Organization2023-01-30T14:39:33-05:00
Go to Top