Tag "CISO"

Back to homepage
Software

Hacker AI vs. Enterprise AI: A New Threat

Artificial intelligence and machine learning are being weaponized using the same logic and functionality that legitimate organizations use.The adversarial use of artificial intelligence (AI) and machine learning (ML) in malicious

Industry Insights

Worldwide spending on security solutions expected to continue growing

Worldwide spending on security-related hardware, software, and services is forecast to reach $103.1 billion in 2019, an increase of 9.4% over 2017. This pace of growth is expected to continue

Industry Insights

Tax season scaries: How to keep your data safe from insider threats

In this Help Net Security podcast recorded at RSA Conference 2019, Juan Pablo Perez-Etchegoyen, CTO at Onapsis talks about the challenges of securing and monitoring ERP applications for vulnerabilities and compliance gaps across

Hardware/Network

Latest trends in automated threat intelligence-driven network security

Since the earliest days of the Internet both network threats and network defenses have been evolving. In this Help Net Security podcast recorded at RSA Conference 2019, Todd Weller, Chief Strategy

Industry Insights

Why Should They Listen to the CISO?

I had an interesting thought whilst flying back from the annual RSA Conference in San Francisco. As we pulled up to the gate I looked around at my fellow passengers

Industry Insights

WHY PROFESSIONALS PREFER CONTINUOUS CYBERSECURITY TRAINING

Continuous learning has many benefits and with the “ever-evolving” technology, learning is the only tool to keep yourself updated and ahead of the competition. In this article, let us see

Hardware/Network

IT managers can’t ignore endpoints because most cyberattacks start there

IT managers are more likely to catch cybercriminals on their organization’s servers and networks than anywhere else, according to the 7 Uncomfortable Truths of Endpoint Security survey by Sophos. In

Industry Insights

What happened to trust and transparency in cybersecurity?

Today, we need proactive security measures that protect the organization responsibly, mitigate risk, and adapt to an ever-changing world. This can only be truly achieved with transparency across the organization.

Software

A strong security posture starts with application dependency mapping

More and more organizations are turning to an agile DevOps culture as part of an ongoing digital transformation to their business, moving from monolithic application architectures to microservices-based applications. At

Software

Enterprise attitudes to cybersecurity: Strategies to balance risk and business acceleration

IT decision makers are facing major challenges between dynamic adversaries, significant legislation and regulation requirements, business digital transformation needs, and a rapidly-growing array of technology solutions. Ideally, business requirements would be the