Tool sprawl is a symptom, and complexity is cybersecurity’s chronic illness. Ashok Sankar of ReliaQuest shares ways to manage this complexity and help organizations rethink how they deploy and measure their cybersecurity defenses.
The threat posed by ransomware attacks, including the growth of cybercriminal cartels, double extortion schemes and big game hunting targeting larger organizations, requires an international response, Anne Neuberger, the deputy national security adviser for cyber and emerging technology, told attendees Tuesday at RSA...
The cybersecurity adversaries embrace the concept of "shift left," so shouldn't the defenders? Shivajee Samdarshi of Venafi discusses the implications and mindset change for software development and engineering teams.
What do the world's leading encryption and security experts think about non-fungible tokens, supply chain attacks, coordinated vulnerability disclosure and the state of quantum computing? The cryptographers' panel at RSA Conference 2021 addressed all these issues.
The DarkSide ransomware gang apparently collected over $90 million in ransom payments from about 47 victims, including Colonial Pipeline Co., since the gang began operating in August 2020, according to the blockchain analytics firm Elliptic, which says it analyzed bitcoin wallet activity.
Telehealth, a remote workforce, cloud migration - these were dreams, but not reality for many healthcare CISOs pre-pandemic. Today's a new world, and ChristianaCare CISO Anahi Santiago is happy to be helping to secure it. She discusses security's role in this new innovation.
A recent study showed that even though 82% of cybersecurity professionals are familiar with the MITRE ATT&CK framework, only 8% said they used it regularly. This led to development of the new MITRE ATT&CK Defender training and certification. Rick Gordon of MITRE Engenuity explains.
When it comes to faster payments, the only way to control fraud is to build in fraud and risk mitigation plans before a transaction is made, says Peter Tapling, board member, U.S. Faster Payments Council.
Security orchestration, automation and response technologies, or SOAR, give organizations the ability to manage an increasing number of alerts. But security experts say there's no worry that SOAR will replace people. In fact, SOAR could help with staff retention.
Manish Dave of LafargeHolcim has been part of the manufacturing industry all his professional life. He heads the IT security and internal controls for the APAC region and aims to have a false positive rate of zero.
As more organizations move to the cloud, expect attackers to follow. Accordingly, what are best practices for organizations to ensure their cloud security journey is a smooth and safe one? Sujeet Bambawale, CISO of 7-Eleven, and Sysdig's Knox Anderson share their insights.
Remote work, unsecured devices, susceptibility to influence - insider threat management has undergone its own transformation over the past year-plus. Rich Davis and Andrew Rose of Proofpoint offer insights into the latest risk trends, as well as technology solutions to aid the defenders' efforts.
How can endpoint security tools help in combating attackers who enter organizations by such stealthy means as "living off the land" attacks? In this Tech Spotlight, Adam Licata of Symantec, a division of Broadcom, discusses the new endpoint security challenges for cybersecurity leaders.
Applications, the network, security - they all have been affected by the seismic changes of the past year, and they drive the need for adopting the "zero trust" model. Zscaler CEO Jay Chaudhry and Nexteer Automotive CISO Arun DeSouza discuss the necessary mindset shift.
Thycotic and Centrify recently merged to create a powerful new player in the privileged access management space. Art Gilliland, CEO of the new ThycoticCentrify, discusses this combined entity and the role it can play for enterprises small and large in ensuring cloud identity security.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.