Meet us in Las Vegas at Zscaler’s ZenithLive June 10-13

Presenting the 2024 Champions in Security Honorees

CISOs Guide

CXO Guide for Generative AI Governance + Responsible Use

CXO Guide for Generative AI Governance + Responsible Use Executive Summary Up Front – Generative AI Basics Generative AI (GenAI) is creating a paradigm shift in how information is consumed as well as produced thereby changing how businesses will be organized from this point forward Accessibility, Versatility, and Productivity are the three primary drivers of explosive GenAI adoption […]

CXO Guide for Generative AI Governance + Responsible Use Read More »

CISO Guide: Cyber Resilience

CISO Guide: Cyber Resilience – How to Build a Data Security Program Resilient to Admin Compromise Post LastPass Breach

CISO Guide: Cyber Resilience – How to Build a Data Security Program Resilient to Admin Compromise Post LastPass Breach Executive Summary Up Front Admin compromises inflict maximum damage due to the extent of privilege associated with admin accounts Admin attacks can result in encrypted data loss (not a big problem as long as the encryption

CISO Guide: Cyber Resilience – How to Build a Data Security Program Resilient to Admin Compromise Post LastPass Breach Read More »

CISOs Guide: 3 Strategies to Maximize Cybersecurity budgets for data security

CISO Guide: 3 Strategies to Maximize Cybersecurity Budgets for Data Security

CISO Guide: 3 Strategies to Maximize Cybersecurity Budgets for Data Security This edition of Portal26’s Data Security Blog is dedicated to optimizing cybersecurity budgets as they relate to securing enterprise data . With the economic forecast being gloomy and waves of budget cuts as well as layoffs, it has become more challenging than ever before

CISO Guide: 3 Strategies to Maximize Cybersecurity Budgets for Data Security Read More »