Having exponentially more devices on the network leads to proportionately less visibility. This is reality for most enterprises today, and it’s changed the role of endpoint security solutions. Elias Levy of Cisco discusses emerging technologies and strategies, including the rise of XDR.
Cybersecurity leaders are not immune to the forces of digital transformation. In fact, Nicolas Casimir, CISO EMEA with Zscaler, says the role is forever changed by the business and technologies evolutions we have seen in 2020.
With COVID-19 as a backdrop and 5G on the horizon, what will be 2021's top issues in identifying, protecting and defending against attacks across a dramatically expanded threat landscape? This latest CEO/CISO panel addresses the challenges of the new year.
Steve Jobs once said: "Marketing is about values." But how well is the cybersecurity solutions message being received amid the convergence of pandemic and economic strains? We brought an outspoken group of CMOs and CISOs together to discuss the topic.
Enterprises want to make greater use of connected devices to develop new services and gain efficiencies, but security is a paramount concern. Piers Hogarth-Scott and Katherine Robins of KPMG break down the risks and the challenges around IoT security.
Timely incident response is more critical than ever, but a decentralized workforce may affect responsiveness. Scott King of Rapid7 discusses how to address the challenges.
The Zero Trust model of information security has become a fixture in both the strategies of enterprise security teams and the roadmaps of security solution developers, and for good reason. Perimeter-focused security architectures that default to high trust levels on the internal network continue to fail disastrously...
The ever-changing threat landscape, with new cyber intrusions and nation-state threats, means organizations must strive to achieve "future proof" security. But what are the key elements of this effort? This keynote session offers insights on building better defenses and creating an effective cybersecurity strategy in...
With the volume of data breaches and cyberattacks continuing to rise, organizations are increasingly relying on breach and attack simulation tools to provide more consistent and automated validation of controls, says Cymulate's Tim Ager.
Netscout is out with its latest threat report, and the research offers some startling new insights into DDoS, advanced threats and the commercialization of cybercrime. Hardik Modi offers analysis.
CrowdStrike is out with its 2019 Global Threat Report, which includes a ranking of the most dangerous nation-state adversaries. The company's CTO, Dmitri Alperovitch, discusses the report's key findings about threats and threat actors.
Digital transformation is having a significant impact on enterprise security. Zscaler's Stan Lowe describes the evolving role of the CISO in the age of cloud and connectivity.
As enterprises embrace strategies built around digital risk management, it isn't that technology becomes a less important conversation. Instead, it's more strategic. Zulfikar Ramzan, CTO of RSA, outline's technology's role in the business path forward.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ca-security.inforisktoday.com, you agree to our use of cookies.