As third-party vendor relationships become more complex and dynamic, organizations need to rethink the way they approach their vendor risk management strategies, says Stephen Boyer of Bitsight.
Easy Solutions' Ricardo Villadiego addresses how the digital revolution, millennials and the pervasive use of online communications affect financial fraud.
Conventional wisdom has long held that humans, because of the mistakes they make, are the weakest links in the security chain. But that's not so, says Rohyt Belani of PhishMe, who explains why.
In today's threat landscape, why do we need a "cognitive" security operations center? Denis Kennelly of IBM Security defines the term and makes the case for taking action.
Bill Conner of SonicWall outlines the key findings of the company's latest threat report, which pinpoints where cybercriminals have made advances in the past year.
As a result of changes in the security environment, it's time to take a new approach to endpoint security software testing, says Tomer Weingarten of SentinelOne.
Phil Reitinger, CEO of the Global Cyber Alliance, a group he describes as a "coalition of the angry," describes how it has channeled this anger into action and tells why he believes the U.S. is in step one of a 12-step cybersecurity program.
Brigadier General (retired) Gregory Touhill was the first federal CISO of the United States. Fresh from that role, he opens up on the state of federal cybersecurity and what the new administration should do to enhance protections.
Randy Trzeciak of Carnegie Mellon University's CERT describes the latest edition of the group's common sense guide to mitigating insider threats and offers an update on his latest research.
What new challenges do security operations center teams face? Gautam Aggarwal of NSS Labs addresses the issues of threat discovery, analysis, enrichment and automation.
Information Security Media Group has a team of editors covering RSA Conference 2017. What are the hot topics from the show floor? Who are the key thought leaders on camera in ISMG's video studio? See and hear highlights from the first two days of the event.
Evil hackers with monomaniacal intentions have long dominated pop culture sensibilities. But when it comes to for-profit hacking, cybercrime predominantly remains a business-driven concern, says Trend Micro's Ed Cabrera.
The cost upsides of writing code that's as free from bugs as possible has long been known, says Veracode's Chris Wysopal, but bugs continue to plague production code. Thanks to the rise of agile programming, however, there are new opportunities to eradicate flaws during development.
Dan Holden, a cybersecurity researcher and technologist, has just taken on the new role of CTO and intelligence director at the Retail Cyber Intelligence Sharing Center. What top challenges is he addressing?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.