Stay on the cutting edge of cybersecurity's evolution and global insight! Subscribe to The Nexus for FREE today!

Fluid Security: Managing Risk in Hybrid Networks

By Amrit Williams

The Nexus  |  13 Jan 2020

For years, security teams have been tasked with supporting the shift to the cloud, all while maintaining the responsibility of securing on-premise infrastructure and assets. Many are no doubt dreaming of the day they reach cloud-only status and they can shake off the fragmentation that creates so...

Cybervictims, Defenders and Cybercriminals: How to Tell Them Apart

By C. Warren Axelrod, Ph.D., CISM, CISSP

The Nexus  |  13 Jan 2020

In this Orwellian era, when opponents are enemies and enemies are co-conspirators, where news is falsified and trust is endangered, it has become well-nigh impossible to apply clear definitions to attackers, victims and defenders in the context of cyberspace. The rapid expansion of social...

Routine Maintenance

By Jonathan Brandt, CISM, CCISO, CFR, CISSP, CSA+, PMP

The Nexus  |  09 Dec 2019

I find that many outside of our profession believe cybersecurity is overly complicated and, frankly, nerdy. Because of this view, soft skills required to translate technical issues into business context are extremely important. This belief may also be dissuading youth from pursuing tech careers...

Tokenization: Your Secret Weapon for Data Security?

By David Close

The Nexus  |  11 Nov 2019

Consider this: 4.1 billion records have been compromised in the first half of 2019 alone, a 54% increase over the same period in 2018.1 Organizations in nearly every industry are facing an ever-growing and out-of-control cybersecurity crisis. Encryption is one of the most effective security...