Opinions
5 things CISOs want to hear about SASE at the RSA Conference
Organizations are planning for secure access service edge (SASE) but have questions on how to get from their current state to converged, cloud-delivered networking and security. They’ll be looking for answers at RSA.
Microsoft Azure Blob leak a lesson to CISOs about cloud security responsibility
Microsoft's apparent misconfiguration of its own cloud bucket exposed third-party intellectual property. Here are the takeaways for CISOs.
5 things CISOs want to hear about zero trust at the RSA Conference
Security executives are interested in how ZT vendors will integrate with existing technologies, supplement ongoing projects, and support business processes.
To better defend digital assets, follow physical security's playbook
It’s high time that the owners and managers of corporate networks take the same approach and sense of urgency to protecting corporate digital assets that their physical security counterparts have taken with building security.
8 things CISOs want to hear from XDR vendors
Beyond industry rhetoric, vendors must use their time at the RSA Conference to provide clarity around what XDR is, where it fits, and how it complements existing security technologies.
Global trends will increase nation-state threats for the US in next 20 years
US intelligence agencies predict more nation-state-sponsored cyberattacks, disinformation campaigns, cyberespionage and intellectual property theft in the coming decades.
4 steps to better security hygiene and posture management
Increasing scale and complexity have made keeping up with security hygiene and posture management cumbersome and error prone, leaving organizations exposed. Here's what leading CISOs are doing to close the gap.
Coca-Cola trade secret theft underscores importance of insider threat early detection
A research engineer used basic exfiltration techniques to steal trade secrets from Coca-Cola, but wasn't caught until she attempted to steal similar data from another company.
Episode 4: Reduce SOC burnout
Episode 4 - Listen to the podcast to learn more about the expanding threat landscape and how security leaders can reduce SOC burnout and enable security teams to be proactive and preventive threat hunters with a modern threat...
The race to secure 5G
The arrival of 5G technology introduces a new era of digital transformation. Security can't be an afterthought.
Episode 3: The Zero Trust Model
Episode 3: In this episode, we look at the steps organizations are taking toward Zero Trust and provide recommendations for making the most of a Zero Trust model to reduce risk while helping employees be more productive, regardless...
Why XDR must include MDR
Technology alone isn't enough; organizations need help with security operations.
XDR is coming: 5 steps CISOs should take today
Beyond threat detection and response, CISOs should think of XDR as an opportunity to modernize the SOC, automating processes, and improving staff productivity. Here's your XDR game plan for 2021.
The .NET patch failure that wasn’t
This month’s patch updates from Microsoft have caused few problems, and though there were some issues related to .NET, even those have been scattered.
How to select a DLP solution: 9 unusual considerations
Data loss prevention systems have become more complex, and each has evolved differently. Here’s how to select a DLP system based on required functionality and its real-life ability to prevent data leaks.
The most important cybersecurity topics for business executives
Data privacy, current cyberthreats, and cybersecurity culture and training top the list, but are these the right priorities?
3 ways to speak the board's language around cyber risk
Framing the cyber risk conversation in ways that resonate with the board will help close the chasm between cyber risk and enterprise objectives.
AWS chief Andy Jassy gets top job at Amazon as CEO Bezos steps down
The surprise announcement that Jeff Bezos will leave later this year and hand over the reins to AWS leader Andy Jassy marks a remarkable rise for Jassy. He began as a marketing manager in 1997 and started AWS in 2003.
-
eBook
Sponsored -
eBook
Sponsored -
White Paper
-
eBook
Sponsored -
eBook
Sponsored
BrandPosts
Learn more-
Sponsored by Fortinet
-
Sponsored by Sophos
-
Sponsored by ExtraHop




![Digital Transformation [DX] > dandelion seeds blown by a virtual wind of change](https://images.idgesg.net/images/article/2020/01/cio_dandelion_seeds_blown_by_virtual_wind_of_change_digital_transformation_flower_by_dawid_zawila_cc0_via_unsplash_abstract_digital_wave_stream_by_pete_linforth_aka_thedigitalartist_cc0_via_pixabay_1200x800-100826623-medium.3x2.jpg)