Kathleen Richards Kathleen Richards is a former features editor of Information Security magazine. Kathleen Richards’s Most Recent Content SearchSecurity cryptography 06 Apr 2020 SearchSecurity Still no answers to endpoint security protection, survey finds 03 Dec 2018 SearchSecurity The threat hunting process is missing the human element 03 Dec 2018 SearchSecurity Ponemon study shows data valuation discrepancies in enterprises 30 Nov 2018 SearchSecurity one-time password (OTP) 30 Nov 2018 SearchSecurity (ISC)2: Cybersecurity workforce shortage nears 3 million worldwide 19 Oct 2018 SearchSecurity At (ISC)² Security Congress 2018, a congressman calls for action 09 Oct 2018 SearchSecurity (ISC)² Security Congress 2018 tackles industry challenges 08 Oct 2018 SearchSecurity Beware of the gray hat hacker, survey warns 02 Oct 2018 SearchSecurity Cloud-first? User and entity behavior analytics takes flight 02 Oct 2018 SearchSecurity Industries seek to improve third-party security risk controls 02 Oct 2018 SearchSecurity Teramind CTO talks insider threat prevention, employee monitoring 28 Sep 2018 SearchSecurity OneLogin security chief delivers new security model 16 Aug 2018 SearchSecurity 10 unified access management questions for OneLogin CSO Justin Calmus 13 Aug 2018 SearchCloudSecurity Container security tools pump up the platform 01 Aug 2018 SearchSecurity Not enough information security analysts, despite higher wages 01 Aug 2018 SearchSecurity Why third-party access to data may come at a price 01 Aug 2018 SearchSecurity Cisco's chief privacy officer on the future of data after GDPR 24 Jul 2018 SearchSecurity NSS Labs ranks next-gen firewalls, with some surprises 19 Jul 2018 SearchSecurity FBI fights business email compromise with global crackdown 15 Jun 2018 SearchSecurity Insider threat report tracks annual cost of theft, carelessness 01 Jun 2018 SearchSecurity Walmart's Jerry Geisler on the CISO position, retail challenges 01 Jun 2018 SearchSecurity Cybercrime study: Growing economic ecosystem spells trouble 01 Jun 2018 SearchSecurity New Walmart CISO discusses protecting the world's largest retailer 31 May 2018 SearchSecurity Threat hunting technology is on the rise, so are threats 29 May 2018 SearchSecurity FBI: Business email compromise tops $676 million in losses 14 May 2018 SearchSecurity A security operations center for hire? Something to consider 10 May 2018 SearchSecurity Device wars: Researchers track new IoT botnet DDoS attacks 17 Apr 2018 SearchCloudSecurity AWS S3 bucket security falls short at high-profile companies 03 Apr 2018 SearchSecurity CISO survey paints a grim picture: Weak staff, breach fears 03 Apr 2018 SearchCloudSecurity New cloud threats as attackers embrace the power of cloud 03 Apr 2018 SearchSecurity Cost of data privacy breach may not be enough 03 Apr 2018 SearchSecurity National Security Agency (NSA) 29 Mar 2018 SearchSecurity Data protection compliance costs less than noncompliance 01 Feb 2018 SearchSecurity User behavior analytics leads the security analytics charge 01 Dec 2017 SearchSecurity The tug of war between user behavior analysis and SIEM 01 Dec 2017 SearchSecurity Are companies with a SOC team less likely to get breached? 01 Nov 2017 SearchSecurity No customer data leaks? Companies look down the rabbit hole 02 Oct 2017 SearchSecurity HTTPS interception gets a bad rap; now what? 01 Sep 2017 SearchSecurity A damaging spring of internet worms and poor performance 01 Sep 2017 SearchSecurity Security innovations need to catch up with technology trends 01 Aug 2017 SearchCloudSecurity Shadow IT risks still primary driver of CASB use 01 Jun 2017 SearchSecurity Report: Threat hunting is more SOC than intel 01 Jun 2017 SearchSecurity Challenging role of CISO presents many opportunities for change 01 May 2017 SearchSecurity CISO job requires proven track record in business and security 01 May 2017 SearchSecurity Outsourcing security services rises as MSSPs focus on industries 03 Apr 2017 SearchSecurity AI or not, machine learning in cybersecurity advances 01 Mar 2017 SearchSecurity Ransomware costs not limited to ransoms, research shows 01 Mar 2017 SearchSecurity Recent ransomware attacks: Data shows 50% growth in 2016 01 Feb 2017 SearchCloudSecurity 2017 forecast: Cloud-based systems headed your way 01 Feb 2017 SearchSecurity CISO job description: Business function more than IT 01 Dec 2016 SearchCloudSecurity Companies make the migration to cloud, security remains on premises 01 Nov 2016 SearchSecurity Even with rise in crypto-ransomware, majority do not pay 03 Oct 2016 SearchSecurity Report: Lack of SSL traffic inspection poses threat to enterprises 03 Oct 2016 SearchSecurity Cyber attribution: Whodunit takes on new meaning in November 03 Oct 2016 SearchSecurity Global report: Cybersecurity skills shortage threatens security 01 Sep 2016 SearchSecurity Q&A: Analyzing DNS services with Paul Vixie 01 Sep 2016 SearchSecurity Cybersecurity risk profiles: Are FICO-like scores a good idea? 01 Sep 2016 SearchSecurity Data breach cost: What influences it the most? 02 Aug 2016 SearchSecurity DevSecOps: Security leaves the silos (and badges) behind 02 Aug 2016 SearchSecurity Mobile risk management falls short in Global 2000 01 Jun 2016 SearchSecurity Throwing money at the cybersecurity problem? 20 May 2016 SearchSecurity What SIEM tools made your short list? 02 May 2016 SearchSecurity Network security infrastructure isn't only for hackers 02 May 2016 SearchSecurity Status quo: Data compromise holds steady in 2016 01 Apr 2016 SearchSecurity What endpoint protection software is on your short list? 01 Apr 2016 SearchSecurity The incident response process is on the clock 01 Mar 2016 SearchSecurity Security incident handling: Prepare to find answers 01 Mar 2016 SearchSecurity Threat defense, hybrid clouds and 'connections others miss' 01 Feb 2016 SearchSecurity Readers' top picks for DLP products 01 Feb 2016 SearchSecurity Integrated IT security tools may hit the 'suite' spot 01 Dec 2015 SearchSecurity Readers’ top picks for advanced threat detection 02 Nov 2015 SearchSecurity Readers’ top picks for enterprise firewalls 02 Nov 2015 SearchSecurity The search for answers to ‘advanced threat’ defense 02 Nov 2015 SearchSecurity The CISO role's evolution from IT security to policy wonk 01 Oct 2015 SearchSecurity The CISO role rises: How is it working out? 01 Oct 2015 SearchCloudSecurity Finding the right balance in hybrid cloud security issues 01 Sep 2015 SearchSecurity Cybersecurity skills shortage demands new workforce strategies 03 Aug 2015 SearchSecurity Cybersecurity skills shortage? Hackers wanted 03 Aug 2015 SearchSecurity User behavior analytics: Conquering the human vulnerability factor 02 Jun 2015 SearchSecurity Catfish, super users and USB drives: We do the math 02 Jun 2015 SearchSecurity Enterprises call on API management for better API security 17 Apr 2015 SearchSecurity Lack of cybersecurity awareness linked to CIOs 01 Apr 2015 SearchSecurity Is the bug bounty program concept flawed? 02 Mar 2015 SearchSecurity Mobile security report: Data on devices 03 Feb 2014 SearchSecurity Big data analytics: New patterns emerge for security 03 Jun 2013 SearchSecurity Botnet takedowns: A dramatic defense 25 Mar 2013