Opinions
Podcast CSO Executive Sessions
Episode 12: Building board relationships
Podcast Episode 12: Mark Weatherford, chief strategy officer at the National Cyber Security Center, joins host Bob Bragdon to talk about building board relationships and why the single most important thing a CSO can do is inspire...
Five ways to keep working from home safe for your employees and your company
For many of us, we're not going back to working from the office anytime soon, so it's time to give serious thought about securing our home offices.
You're going to be using confidential computing sooner rather than later
These days it's not enough to secure your data when it's on your disk or moving across your network, you need to lock it down in memory as well.
5 persistent challenges security pros face
Highlights from the fourth annual “Life and Times of Cybersecurity Professionals” report
New US digital identity legislation promises more secure verification
COVID-19 has exposed the US’s lack of a comprehensive digital identity strategy. If passed, the Improving Digital Identity Act of 2020 will address this need through engagement among federal, state and local governments.
Addressing diversity in security
Turning good intentions into action requires a collaborative approach across the public sector, private sector, and non-profit industry associations.
Why it's time to shift to extended validation certificates
More than ever, a strong organizational identity is essential for building trust with users.
7 things to consider when choosing managed detection and response
Many organizations lack the internal expertise to address threat detection and response effectively; MDR can fill the gap. Here’s what to look for when you shop for MDR services.
Podcast CSO Executive Sessions
Episode 11: TikTok don’t stop: Data privacy and the transparency imperative
Podcast Episode 11: Listen now as Roland Cloutier, Global CSO at TikTok, joins host Bob Bragdon to discuss the challenge and opportunity he took on when joining the fast-growing social media startup.
What the use of open banking means for identity networks
By connecting identity data from multiple sources through APIs, the open banking concept can help verify identity more reliably and improve the customer experience.
Bracing for the security data explosion
Organizations must prepare for collecting, processing, analyzing, and acting upon terabytes of security data.
3 XDR market challenges
XDR is a promising concept, but XDR vendors face deployment challenges and competition on several fronts.
10 security changes post-COVID-19
CISOs must anticipate burgeoning needs for distributed security scale, intelligence, and self-service.
Why frameworks are more necessary than ever for secure enterprise transformations
Taking governance shortcuts in order to quickly take advantage of competitive opportunity can lead to major failings when it comes to security and privacy and cause serious long-term damage to the business.
Why COVID-19 will change identity management forever
Large job losses, more people working from home, and an increased use of freelancers and consultants are forcing companies to rethink their access control models.
10 things you should know about XDR
An initiative more than a technology, XDR seeks to simplify and unify security technologies to make the whole greater than the sum of its parts.
Securing IoT requires a shift to a security fabric
The IoT era and the expectation that everything will be connected, accelerates the need to move away from point products and toward the concept of a security fabric.
Amid the pandemic, using trust to fight shadow IT
With most workers scattered at home and trying to come up with their own ad-hoc IT workarounds, there’s an easy way for IT shops to build trust: communicate.
4 tips for a successful cyber threat intelligence program
COVID-19 has opened the cyberattack floodgates; defenders need strong cyber threat intelligence (CTI) analysis, operationalization and sharing. Here's how to get more from your CTI program.
COVID-19 pandemic accelerates transformation in enterprise security
Organizations must retool their policies and invest in security programs to acclimate to a post-COVID-19 business landscape.
-
White Paper
-
White Paper
-
White Paper
-
Video/Webcast
Sponsored -
Video/Webcast
Sponsored
BrandPosts
Learn more-
Sponsored by Fortinet
-
Sponsored by AT&T
-
Sponsored by Hewlett Packard