For maximum effectiveness, security-as-a-service solutions can no longer simply be reactive, but must instead be predictive, says Mat Gyde, CEO Security Division, NTT Ltd., and Palo Alto Network's Karl Soderlund, as they describe their companies' new partnership.
Office365 and SaaS usage are driving a shift away from managing security on premises, necessitating stronger security in the cloud, says Kowsik Guruswamy, CTO at Menlo Security.
Want to maximize your digital transformation project success and impact? Start by ensuring that you correctly explain risk to stakeholders, as well as continually benchmark your organization's risk management maturity, says ServiceNow's Barbara Kay.
ForgePoint Capital, a venture capital firm focused on cybersecurity, recently announced a new $450 million investment fund targeted solely on advancing cyber defenses. Alberto Yépez, managing director of ForgePoint, discusses his investment strategy.
Etay Maor has long been a force in cyber crime research. In his current role as CSO of Intsights, he has new views of breach trends, tools and techniques, as well as analysis of what's happening in fraud circles beyond the dark web.
For the past year-plus, RSA and ISMG have teamed up for a series of North American cybersecurity roundtables dedicated to digital risk management. RSA's Ben Smith shares highlights of discussions about third-party risk, privacy and multi-cloud transformation.
Steve Katz, the world's first CISO, who cut his teeth at Citi and Merrill Lynch, stays current with emerging tech and business trends, and he has advice to share with the next generation of cybersecurity leaders.
A new report from the GAO finds that while multiple federal agencies have succeeded in closing and consolidating centers across the government, over the last eight years many facilities remain vulnerable to cyberthreats from lack of oversight and reporting.
Let's Encrypt is going to take a softer approach to resolving the impacts from a bug in its systems that issues free TLS certificates. It will hold off revoking about 1 million certificates until those certificates either expire or are replaced.
It's relatively easy to list an enterprise's cybersecurity priorities for 2020. But who owns them? What are the hurdles to completing these projects? These can be tougher questions to answer, says Ellen Sundra of Forescout.
The latest edition of the ISMG Security Report discusses the developing definition of "Insider Risk." Plus, Former DHS Secretary Michael Chertoff on U.S. 5G rollout plans; Cloud Security Alliance on containers and microservices.
RSA 2020 touched on a number of topics, including the security of elections and supply chains, plus AI, zero trust and frameworks, among many others. But from sessions on cryptography, to this year's lower attendance, to the antibacterial dispensers dotted around venues, concerns over COVID-19 also dominated.
What is the state of cybersecurity in the energy sector, and what are some of the myths and realities about its top threats? Sean Plankey of the US Department of Energy addresses these questions.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.