The Government Accountability Office (GAO) has released a report indicating that the implementation of the Federal Information Security Modernization Act of 2014 (FISMA) by federal agencies remains ...
As solutions to managing cybersecurity threats increase, surprisingly few metrics are available on how well these methods work to secure organizational assets. The National Institute of Standards and ...
One of the most difficult aspects of managing risk in information assurance (IA) is that our statistical information is so poor. We don’t know about security breaches that we have not noticed; we ...
Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI coverage. Learn More The metrics that quantify cybersecurity’s contributions to a business’ ...
BURLINGTON, Mass., April 16 /PRNewswire/ -- ClearPoint Metrics today announced a technology alliance with PGP Corporation, a global leader in enterprise data protection, to integrate PGP Universal(TM) ...
LAS VEGAS — Metrics that measure only the performance of security personnel and the tools they use are of limited value when it comes to assessing the true effectiveness of data protection investments ...
How do we manage what we can’t measure? One of the cornerstones of the scientific method is measurability: a focus on defining the ways of counting or measuring aspects of reality that we hope will be ...
There are multiple metrics CISOs can use to improve the effectiveness of security efforts and demonstrate key business alignment, among other benefits. Measuring security performance may not sound ...
As cyberthreats grow more sophisticated and costly, business leaders are pouring more money than ever into cybersecurity ...
Metrics are vital for security leaders to track the progress of security programs and have effective, risk-focused conversations with business and operations stakeholders. As today's security ...
p>Last month, we began exploring how to determine whether our corporate security program is effective. To start, we should be able to answer “yes” to these three questions: 1. Does the program have ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results