Concertium

From cost center to cost mitigation

From cost center to cost mitigation

What's the biggest thing holding you back from making cybersecurity a priority? For most CISOs and security executives, it's the fact that cybersecurity is perceived as a cost center rather than part of an overall cost mitigation strategy. Cost Center Mentality...

read more
Suddenly CISO Series: Avoiding the post-merger hangover

Suddenly CISO Series: Avoiding the post-merger hangover

Mergers and acquisitions create huge growth opportunities — but, as with any good thing, they come with transition challenges, especially in security. Pre-merger planning activities are often focused within strategic, operational, and legal teams, while other groups...

read more
The case for cloud-hosted virtual desktops

The case for cloud-hosted virtual desktops

Cloud-Hosted Virtual Desktops are part of a cutting-edge technology approach that presents companies with many advantages in terms of cost, speed, sustainability, and more — but particularly in the critical area of cybersecurity. But first, what is a Cloud-Hosted...

read more
Cybersecurity roles for board members

Cybersecurity roles for board members

Cyber-threats and data breaches can cause major disruptions to large and small companies. Today, businesses are being forced to adapt. What used to be the standard — relying on modern firewalls and insulating key corporate functions — has given way to a far more...

read more

Categories

Blog
Security

Download Our Conversation Guide to Cyber Risk Discussions

Fill out my online form.

Download Our Suddenly CISO Handbook

Fill out my online form.