Strategy and Planning

Things to Consider When Calculating the Return on Security Investment

Things to Consider When Calculating the Return on Security Investment

The Legal Risks of Monitoring Employees Online

The Legal Risks of Monitoring Employees Online

Leveraging reconfigurable computing for smarter cybersecurity

Leveraging reconfigurable computing for smarter cybersecurity

Is a Good Offense the Best Defense Against Hackers? ...

Is a Good Offense the Best Defense Against Hackers? ...

Book review: Serious Cryptography: A Practical Introduction to Modern Encryption

Book review: Serious Cryptography: A Practical Introduction to Modern Encryption

The Benefits of Operational Risk Management

The Benefits of Operational Risk Management

Automation Could Be Widening the Cybersecurity Skills Gap

Automation Could Be Widening the Cybersecurity Skills Gap

Security myths: modern federation is enough

Security myths: modern federation is enough

Is source code inspection a security risk? Maybe not, experts say

Is source code inspection a security risk? Maybe not, experts say

How ready are you to stop an advanced attack?

How ready are you to stop an advanced attack?

What is the Appropriate Level of Cybersecurity for OT Systems? Cyber Insurers Want to Know

What is the Appropriate Level of Cybersecurity for OT Systems? Cyber Insurers Want to Know

How do New Cybersecurity Risks Shape Approaches to Risk Assessments?

How do New Cybersecurity Risks Shape Approaches to Risk Assessments?

Brrr! It's a snow day and someone has pwned the chuffin' school heating

Brrr! It's a snow day and someone has pwned the chuffin' school heating

The Top Three Cybersecurity Tasks For Any Board

The Top Three Cybersecurity Tasks For Any Board

When DevOps And SecOps Collide: How To Improve Collaboration To Enable Agility

When DevOps And SecOps Collide: How To Improve Collaboration To Enable Agility

Cybersecurity Stocks: What to Watch in 2018

Cybersecurity Stocks: What to Watch in 2018

Read about the best strategies, cyber security best practices and cyber security tips.

This category provides expertly curated cyber security news on the cyber security strategy and planning. Cyber Strategy and planning is a broad term that includes but is not restricted to cyber security governance, cyber security best practices, cyber security tips, cyber security definition. The sole aim is to impart situational awareness to the individual user and organizational teams that helps them follow the best practices and benchmark standards set across the industry. The news published under this category helps user with awareness on various important topics that add to the decision-making ability of the individual or the organization on sensitive issues like cyber defense strategy and planning. This category covers both the private and the government sector. Detailed analysis of the cyber security plan adopted by various governments, and corporate giants are often discussed with meticulous observations to enrich the understanding of our users.