Strategy and Planning

How to Increase Transparency and Rebuild Trust After a Data Breach

How to Increase Transparency and Rebuild Trust After a Data Breach

Financial institutions launch their own cyber range to train defenders, test tools

Financial institutions launch their own cyber range to train defenders, test tools

The Security Monitoring Journey Continues Evolving

The Security Monitoring Journey Continues Evolving

Don't Just Put Out the Zero-Day Fire — Get Rid of the Fuel

Don't Just Put Out the Zero-Day Fire — Get Rid of the Fuel

Post Equifax Plea: Change Your Software Security Practices or Be Damned (Again)

Post Equifax Plea: Change Your Software Security Practices or Be Damned (Again)

Meet the Army's cyber protection force -- FCW

Meet the Army's cyber protection force -- FCW

Cybersecurity evolution brings shifts for network security

Cybersecurity evolution brings shifts for network security

Why FireEye, Inc. Could Be a Gold Mine for Growth Investors

Why FireEye, Inc. Could Be a Gold Mine for Growth Investors

Perry Carpenter: “Don’t be Afraid of Simulated Attacks”

Perry Carpenter: “Don’t be Afraid of Simulated Attacks”

Minimizing Cyber Risks as Healthcare Providers Increase Technology Use

Minimizing Cyber Risks as Healthcare Providers Increase Technology Use

Securing Legacy IT Systems from Modern Application Threats in the Financial Sector

Securing Legacy IT Systems from Modern Application Threats in the Financial Sector

Why growing networks will need continuous cyber-security

Why growing networks will need continuous cyber-security

Cyber Essentials accreditation should be the first step on your cyber security journey

Cyber Essentials accreditation should be the first step on your cyber security journey

How to survive the worsening cyber threat landscape

How to survive the worsening cyber threat landscape

The need for better proactive cyber defense

The need for better proactive cyber defense

The Trump administration is looking for its 'cyber moonshot'

The Trump administration is looking for its 'cyber moonshot'

Read about the best strategies, cyber security best practices and cyber security tips.

This category provides expertly curated cyber security news on the cyber security strategy and planning. Cyber Strategy and planning is a broad term that includes but is not restricted to cyber security governance, cyber security best practices, cyber security tips, cyber security definition. The sole aim is to impart situational awareness to the individual user and organizational teams that helps them follow the best practices and benchmark standards set across the industry. The news published under this category helps user with awareness on various important topics that add to the decision-making ability of the individual or the organization on sensitive issues like cyber defense strategy and planning. This category covers both the private and the government sector. Detailed analysis of the cyber security plan adopted by various governments, and corporate giants are often discussed with meticulous observations to enrich the understanding of our users.