The CEO of Bit9 speaks from experience: His firm was hacked, sensitive data stolen and customers put at risk. And what's happened since represents his mission to fend off attackers, even as they refine their hacks.
Technologies that allow companies to analyze cyberthreats are evolving and soon should provide better intelligence to mitigate attacks, says Jim Anderson, a president at BAE Systems Applied Intelligence.
Recognizing the behavior of an intruder, rather than relying on digital signatures, will prove to be a better way to prevent hackers from pilfering data and creating havoc in IT systems, says Radware CEO Roy Zisapel.
Data breaches are inevitable, hence it's up to executives to ensure their enterprise is secured, without trying to encrypt everything, warns Prakash Panjwani, president and chief executive officer of SafeNet.
The increase in sophisticated hacking attacks will lead other sectors to follow the lead of the financial services industry in implementing multifactor authentication, says Ken Hunt, CEO of VASCO Data Security International.
Ninety percent of even the largest global firms are susceptible to targeted attacks. And if adversaries want to get in, they can, says Peter George, CEO of Fidelis Security Systems, who discusses new security strategies.
Distributed-denial-of-service attacks, fueled by the interconnected nature of smart devices, will only continue to increase, says Matt Moynahan, president of Arbor Networks. "The infrastructure itself is insecure," he says.
Richard Spurr has been CEO of security vendor ZixCorp for more than 10 years. How has his approach to e-mail security evolved, and how does he see evolving threats and the marketplace changing in the year ahead?
As CEO of ForeScout Technologies, which focuses on continuous monitoring of networks, T. Kent Elliott says he has to anticipate the next generation of vulnerabilities. So what's the most significant emerging risk? The Internet of Things.
Gary Steele has seen attack methods rapidly evolve over the last five years. But what the CEO of Proofpoint hasn't seen is a comparable evolution in how the security industry responds to attacks.
Financial transactions on smart phones require layered security that helps outsmart cyberthieves, says Alan Dabbiere, chairman of AirWatch, who describes today's mobile challenges.
Lost and stolen mobile devices might be a leading cause of data breaches. But it's a strategic mistake for enterprises to focus too heavily on device security, says Christy Wyatt, CEO of Good Technology.
Yes, there is a global security staffing shortage. But what is the cause, and what can be done to address the crisis? Hord Tipton of (ISC)² offers his take on key issues facing the profession.
Brendan Hannigan became IBM's top security systems executive in 2011, when Big Blue acquired the company he ran, Q1 Labs. Hannigan says acquisitions will remain a key component in the growth of IBM's security business.
"It's a tough conversation, telling [clients] they've spent a lot of money on defense-in-depth that isn't working," says FireEye CEO David DeWalt. "If they don't change, they're risking their company."
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.