/Shannon Smith

About Shannon Smith

This author has not yet filled in any details.
So far Shannon Smith has created 44 blog entries.

Cyber Security Training – Top 12 Resources

As more organizations hire information security professionals to help protect their data from breaches, demand for these roles has far outpaced the supply of skilled talent. With the cyber security industry estimated to grow from $75 billion in 2015 to $170 billion by 2020, the gap will continue to widen. Globally, there are more than [...]

October 3rd, 2016|Uncategorized|0 Comments

17 Security Criteria to Look at When Evaluating a Cloud Service

Rank and file employees are pushing for greater adoption of cloud services to improve their own performance and deliver business growth, creating pressure on IT organizations to assess the security of these applications before permitting their use. A recent survey conducted by the Cloud Security Alliance found that, on average, IT professionals receive 10.6 requests [...]

September 23rd, 2016|Uncategorized|0 Comments

Putting IT at the Center of Business

There’s no way around the fact that the role of the chief information officer has its stressful moments. Between the threat of data breaches and outages, the CIO role could seem like a firefighter-in-chief position. Yet CIOs have come a long way from exclusively dealing with operations maintenance. CIOs today can add outpacing the competition, [...]

August 28th, 2016|Uncategorized|0 Comments

13 Box Security Best Practices

As one of the most widely used file sharing SaaS platforms, Box was built from ground up with Enterprises’ security needs in mind. There are a lot of out-of-the-box features that Box admins should utilize to make the most of Box’s built-in security capabilities. For example, we all know the wisdom behind requiring users to [...]

August 20th, 2016|Uncategorized|0 Comments

The Top 5 IT Security Skills for the Next 5 Years

At one time time, the IT department was perceived as a back office support function. Unlike the sales or marketing departments, there didn’t exist a direct correlation between IT spending and revenue. Today’s enterprise operates in a different landscape. Executives now view information as a competitive advantage and the IT department as the driver of [...]

July 22nd, 2016|Uncategorized|0 Comments

CIO Corner: Closing the Skills Gap

In the technology arms race, skilled professionals may be the weak link. IT tools have evolved to better protect data and detect threats. Now, IT departments’ greatest weakness appears to be a shortage of employees with the right skills to implement these tools. In this week’s CIO Corner, we take a look at what CIOs [...]

July 13th, 2016|Uncategorized|0 Comments

4 Best Incident Responses of All Time

When you look at the worst responses to data breaches, one thing becomes clear: when an incident response makes a breach worse it is usually characterized by a lack of preparation before the breach and poor execution of a response plan after the breach. However, not all breaches result in millions of dollars in fines [...]

June 28th, 2016|Uncategorized|0 Comments

How Ransomware Pivoted to the Enterprise

Cyber attacks are occurring at a steadily increasing clip, leading each successive year to replace its predecessor as “Year of the Data Breach.” 2016 hasn’t exactly broken from this trajectory, but it has forged its own path by earning the title, “Year of Ransomware.” This trending attack type isn’t the most complex or innovative new [...]

June 15th, 2016|Uncategorized|0 Comments

How to Implement a Cloud Governance Framework – Whiteboard Walkthrough

There are over 19,000 cloud services available today. While you’ve likely heard of popular file sharing services Dropbox and Google Drive, you may be less familiar with 4shared, ZippyShare, and Sendspace, which are far riskier services in that category. Until recently, many organizations have resorted to simply blocking well-known cloud services with their web proxy [...]

May 2nd, 2016|Uncategorized|0 Comments

Cloud Access Control for Managed / Unmanaged Devices

When applications and data were on premises, IT had controls that limited access to authenticated users signing in from enterprise-managed devices. Now that applications and data are moving to the cloud and enterprises are embracing BYOD programs, IT expects these same controls for cloud services. The concern is that as users access corporate data in [...]

April 12th, 2016|Uncategorized|0 Comments