Securing the perimeter has given way to securing the application environment. And with this shift comes a new urgency to inject real-time security solutions in these dynamic new environments. Sameer Malhotra, CEO and co-founder of TrueFort, shares insights.
Telehealth, a remote workforce, cloud migration - these were dreams, but not reality for many healthcare CISOs pre-pandemic. Today's a new world, and ChristianaCare CISO Anahi Santiago is happy to be helping to secure it. She discusses security's role in this new innovation.
Thycotic and Centrify recently merged to create a powerful new player in the privileged access management space. Art Gilliland, CEO of the new ThycoticCentrify, discusses this combined entity and the role it can play for enterprises small and large in ensuring cloud identity security.
As more organizations move to the cloud, expect attackers to follow. Accordingly, what are best practices for organizations to ensure their cloud security journey is a smooth and safe one? Sujeet Bambawale, CISO of 7-Eleven, and Sysdig's Knox Anderson share their insights.
The mass migration to cloud has only added to the global cybersecurity gap, and John Yeoh, global vice president of research at the Cloud Security Alliance is among those calling for greater "diversity by design" as enterprises look to fill these roles.
The ongoing pandemic has driven massive changes in business operations, including increased remote work and accelerated cloud transformation. But while those have enabled organizations to be more agile, they also pose multiple compliance and operational challenges, says Todd Moore, vice president of encryption...
Welcome to RSA Conference 2021. By virtue of being virtual, we've brought our entire global team to bear on gathering the very latest cybersecurity trends, technologies and takeaways from our industry's leading thinkers via ISMG's largest and most diverse set of video interviews to date.
Manoj Sharma has been associated with Symantec for nearly 20 years. But during that time he did not see seismic changes like the ones that have altered the cybersecurity landscape over the past 15 months. He shares insights on how to secure the new extended enterprise.
For anyone wondering how the Russian-speaking, ransomware-wielding DarkSide crime syndicate was able to disrupt a major U.S. fuel pipeline, a more pertinent question might be: Why didn’t it happen sooner?
Attackers are increasingly using malicious OAuth 2.0 applications to siphon data and access sensitive information from cloud platforms, and mitigating the risks is proving challenging, according to the security firm Proofpoint.
Almost every organization has adopted cloud computing to some extent, and with this great power comes great responsibility. How are cybersecurity leaders managing visibility, access and risk? We asked this exclusive panel of CEOs and CISOs, and they shared frank and thoughtful advice.
Does the West want to have its digital existence defined by adversaries, or is it ready to devote the time, resources, expertise and planning required to more fully take control of its evolving destiny? That's the techno-Darwinian call to arms issued by Jeremy Fleming, the director of Britain's GCHQ intelligence...
Rapid7 has acquired Velociraptor, an open-source endpoint-monitoring organization and community that will continue to operate as a stand-alone entity while the security firm adopts some of its technology. Meanwhile, Zscaler had announced a deal to buy Trustdome.