As cyberattacks get more sophisticated, there is a growing need for detection and response to address these emerging threats, says Dan Schiappa of Sophos.
The need for enhanced mobile application security is being driven by increasingly powerful mobile devices and ubiquitous availability of bandwidth, says John Aisien, CEO, Blue Cedar.
Too many organizations continue to approach security with a "perimeter defense" mindset despite enterprise networks long having moved past on-premises data centers to myriad cloud services, says Ajay Arora of Vera Security.
Many security leaders recognize the flaws in traditional awareness training, but what is anybody actually doing about it? Keenan Skelly of Circadence describes a new approach that she believes has changed the cybersecurity education paradigm.
Evolving from endpoint detection and response, security vendor Nyotron has a new approach called endpoint prevention and response. What's the distinction? CTO Nir Gaist explains the strategy.
The "right to be forgotten" is a critical component of the EU's GDPR, but requirements vary widely globally. Mike Kiser of SailPoint discusses related identity governance issues.
Threat hunting is a critical but labor-intensive task for security analysts. But automation can provide significant advantages, says Steven Grossman of Bay Dynamics.
Security awareness training is typically an Achilles heel for enterprises. But Kyle Metcalf of Inspired eLearning believes he's found the elements that create an effective training solution.
CISOs need to work with partners in other departments to help ensure the success of major security projects, says John Pescatore, the director of the SANS Institute, who spoke at RSA Conference 2019.
The Global Cyber Alliance has unveiled a "cybersecurity toolkit" for small to midsize enterprises. Phil Reitinger of the GCA and Jon Brickey of Mastercard discuss this new program.
The traditional information network is undergoing radical change, and so is the approach to network security. Jesse Rothstein of ExtraHop discusses the present and future of enterprise network security.
What's the difference between an elite and a less mature DevSecOps program? Sonatype's Derek Weeks unveils the results of the 2019 DevSecOps Community Survey.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.