212-256-9890

16 May, 2018

Down on Music Row: The Transformational CISO Assembly Successfully Takes on Nashville

 -

Last week, The Millennium Alliance held the first cybersecurity event of the year to massive success. From May 9th to the 10th, The Transformational CISO Assembly brought together C-Level executives from all walks of security and IT to an intimate setting in one of the finest hotels in Nashville,...

Read more
17 Apr, 2018

34 Tech Companies Have Come Together To Stand Behind Cybersecurity

 -

Progress was made in the tech world today, specifically in the cybersecurity realm, thanks to 34 global technology and security companies who took part in a Cybersecurity Tech Accord. The news broke on all major media outlets, and soon enough, social media sites like LinkedIn caught on. Why? Well,...

Read more
23 Mar, 2018

This Weeks Publication Review Gives You Insight Into Security

 -

It’s time for our weekly publication review. Have you missed these? It’s been a while. We’ve missed you too. This week, we will touch on a security publication that provides us with tons of news on a daily basis. Since security is so important to us, it is even...

Read more
07 Feb, 2018

Sertainty Reveals Cybersecurity Insights In Exclusive Interview

 -

With our Transformational CISO Assembly approaching, Digital Diary sat down with one of our sponsors, Sertainty, to gain a first-hand insight into the depths of cyber attacks and the measures that enterprises can go to in order to incorporate cybersecurity into business plans. Cyberspace has not been defensible, since...

Read more
23 Jan, 2018

Does Your Business Need A Modern Cybersecurity Plan?

 -

Any business would benefit from integrating a cybersecurity plan, especially if that business is interested in protecting important data and information from hackers or breaches. The trick to making sure that this plan is up to par with the latest technology tools is to make sure that it consists...

Read more
30 Nov, 2017

How Does A CIO Implement A Successful Approach To Information Security?

 -

Information security is a necessary component of any CIO’s strategy. This approach can also be referred to as “infosec” which basically refers to any strategy that is put in motion to protect, detect and documenter threats to all enterprises’ information, digital, or non-digital. This information is a priority to protect,...

Read more
20 Nov, 2017

Federal CIOs Are Struggling With Software Licensing According To FITARA

 -

If you are a security professional, chances are you know what the Federal Information Technology Acquisition Reform Act (FITARA) scorecard is. This scorecard is used for federal CIOs but should be used as a guideline for corporate CIOs. On November 14, a new scorecard was released in order to grade...

Read more
20 Nov, 2017

Frost & Sullivan Reveal Endpoint Security Priorities Of Industry Leaders

 -

If it is one thing that is for sure, it is that IT security leaders must always be prepared to protect their company from the possibility of hackers targeting their servers, endpoints, and PCs. Because of this, it is important to have a strong endpoint security plan, as well...

Read more
31 Oct, 2017

The Role Of The Public Sector CIO vs. The Private Sector CIO

 -

The role of the CIO is complex and important for the infrastructure of an enterprise looking to combat and address cybersecurity issues. It can be broken down based on different priorities and can be placed into two different job titles: private CIOs and public sector CIOs. The role of...

Read more

Does Your Business Need A Social Media Security Plan?

 -

Many of us use social media on a daily basis. We use it to communicate our thoughts, ideas, business strategies and even what we do during our leisure time. Social media has provided users an opportunity to connect with a spectrum of individuals from all walks of life, careers, and...

Read more