Ryan Francis

Contributor

Ryan Francis has been in the tech publishing field for 17 years.

How CISOs can answer difficult questions from CEOs

How CISOs can answer difficult questions from CEOs

A hypothetical conversation can become all too real, and hopefully you are prepared with the answers. Here is a script to help get you started.

Incident response is like tracking down a perpetrator

Incident response is like tracking down a perpetrator

What is incident response? Larry Zulch, President & CEO, Savvius, walks us through the crime scene.

New products of the week 5.15.17

New products of the week 5.15.17

Our roundup of intriguing new products from companies such as Virtual Instruments and Archive360.

Q&A Citrix CSO: How to deal with security across multiple generations of employees

Q&A Citrix CSO: How to deal with security across multiple generations of employees

Citrix’s CSO Stan Black has been in the cybersecurity field for 20 years. He talks about how security has changed among employees in each generation.

How to counteract another ‘Dyn-like’ attack

How to counteract another ‘Dyn-like’ attack

Jim Hurley, a Distinguished Analyst at technology research and advisory firm ISG, shares his insights on what enterprises using cloud-based as-a-services can do to work with their providers and reduce risks to their business from...

Top DRaaS companies to watch

Top DRaaS companies to watch

Forrester Research recently released its report naming Sungard AS, Bluelock, IBM, and iland as the top disaster recovery-as-a-service companies. See its reasoning why.

Six things you need to know about IoT security

Six things you need to know about IoT security

It’s in every company’s best interest to “do” IoT correctly, which will mean ratcheting up security measures to capture and ensure a good customer experience. Jack Nichols, director of product management at Genesys, proivdes six ways...

New products of the week 5.8.17

New products of the week 5.8.17

Our roundup of intriguing new products from companies such as CA and Citrix.

Computer forensics follows the bread crumbs left by perpetrators

Computer forensics follows the bread crumbs left by perpetrators

As investigators, these security pros let the clues lead them. See in a few examples how commercial software helps these techies solve the crime.

Pitfalls of identity access management

Pitfalls of identity access management

Whether dealing with a third parties access or tracking an insider through your network, action needs to be taken to see who goes where. Too few organizations treat IAM as the crucial, secure connective tissue between businesses'...

How to strike ransomware out

How to strike ransomware out

Carbonite created this list of 10 important ransomware prevention tips and best practices.

False positives still cause threat alert fatigue

False positives still cause threat alert fatigue

How you set up and prioritize which alerts to look at and act on is the basis for an effective threat management strategy.

How can CSOs protect their CEO?

How can CSOs protect their CEO?

CEOs have a high level of visibility outside the organization and attackers can leverage the data they collect as a way to target them for cybersecurity attacks. Organizations can help protect your CEO from cybersecurity attacks by...

Believe your employer doesn’t know about your legal problems? Think again

Believe your employer doesn’t know about your legal problems? Think again

Companies hire a third party to scour public databases to make sure employees are not getting into legal trouble that would impact their jobs. But is it ethical? Experts explain.

New products of the week 5.1.17

New products of the week 5.1.17

Our roundup of intriguing new products from companies such as Red Hat and Kaspersky Lab.

Users have little confidence their company can protect their mobile device

Users have little confidence their company can protect their mobile device

A survey sponsored by Check Point found that 64 percent of respondents are doubtful that their organization can prevent a mobile cyberattack. What can be done to combat that?

10 ways CSOs can achieve ROI on a network solution

10 ways CSOs can achieve ROI on a network solution

Setting up and protecting the network infrastructure is a major challenge and needs to be even more sophisticated and dynamic than ever before. Here are 10 points that need to be considered to achieve ROI and deliver payback

9 tips to turn your data center green

9 tips to turn your data center green

Jeff Biggs, executive vice president of Operations & Technology at Peak 10, provides a few steps data center providers can take to improve their energy efficiency model overall.

9 questions to ask when selecting application security solutions

9 questions to ask when selecting application security solutions

Organizations need to determine the right tools to stay relatively risk free. Open source security vendor Black Duck explains why asking these key questions can help you determine the right mix of application tools and capabilities...

Healthcare records for sale on Dark Web

Healthcare records for sale on Dark Web

A clinic in Baltimore is just one example of a healthcare provider having its records stolen, only to find them on the Dark Web for less than one cent per record.

Load More