Good threat intelligence can help in facilitating information exchange between the network operations team and the security function, says Paul Bowen of Arbor Networks.
You're the new kid on the cybersecurity block. You believe you have a unique solution to address an unresolved challenge in the security stack, and beta customers are bullish on your company's potential. We asked: "So what?" What makes these companies different? See startups deliver their quick pitch.
Privacy regulations, user satisfaction concerns and the need to prevent data breaches are driving more organizations that must authenticate users to find "a better way of ensuring that people are who they are when they are accessing critical information," says Tony Smales, CEO of Forticode.
Abhirukt Sapru, head of business development at Tessian, describes the use of machine learning to help prevent highly sensitive information from being sent to the wrong person via email.
Sandip Kumar Panda, co-founder and CEO of InstaSafe, which offers a software-defined perimeter solution, talks about his company's approach toward secure connectivity.
As the European Union's General Data Protection Regulation enforcement date approaches, organizations are working to address challenges, including changing the broadly accepted definition of what constitutes personally identifiable information, says Rashmi Knowles of RSA.
Cybersecurity and fraud prevention functions need to start working more closely together to share and leverage cross-functional knowledge that can help improve security, says Michael Thelander of iovation.
Brett Johnson stole millions in a fraud career that made him one of the FBI's most wanted criminals. But now he's sharing his secrets to help organizations fight fraud. Why the change of heart?
What's it like to be the CISO of a security company? Mike Convertino of F5 Networks says if a CISO uses the company's products, he or she can provide valuable feedback for product development.
The biggest challenge with securing massive enterprise resource planning platforms is that organizations are unclear about who is responsible for ERP security, says Alexander Polyakov of ERPScan.
The Ashley Madison breach of 2015 quickly became one the most famous of the high-profile hacks. Three years later, CISO Matthew Maglieri discusses the breach recovery and what he refers to as "cybersecurity in a world of discretion."
Security still remains an afterthought when many organizations are adding new technologies to provide a differentiated customer experience, says Anna Convery of Radware, who recommends a change in approach.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.