Highly secure, high-assurance cryptography is required to securely remotely manage autonomous vehicles and internet of things device, says Peter Galvin of nCipher.
Automated workflows can help pre-emptively report cybersecurity risks to the board and allow for better qualitative approaches to interpreting data, says Ben de Bont, CISO of ServiceNow.
Growing data sources and intel feeds are making it more challenging for security teams to find the signal in a very noisy landscape, says Neustar's Brian McCann.
As businesses face pressure to release software faster, security is unfortunately not keeping pace, says Anthony Bettini of WhiteHat Security, who reviews DevSecOps challenges.
A network-based approach to visibility can succeed in providing critical insights, while node-based approaches may hit bottlenecks, says Lastline's Giovanni Vigna.
Triaging growing volumes of SOC telemetry is becoming increasingly untenable for security teams, says Cysiv CEO Partha Panda, who makes the case for SOC-as-a-Service offerings.
2019 was the year when enterprises across all sectors woke up to the scale of their third-party risk challenges. How will they respond to those risks in 2020? Jaymin Desai of OneTrust shares insights.
Today's organizations are increasingly using multi-cloud environments, exacerbating third-party risk, says Frank Price of CyberGRX, who provides risk management insights.
Nearly eight out of 10 organizations were victims of at least one successful cyberattack in the previous year, according to the 2019 Cyberthreat Defense Report. While corporate strategies around digital transformation are driving measurable business outcomes, they are - at the same time - creating new security risks...
Mobility and digital transformation have forced enterprises to radically rethink their security strategies - particularly in new multi-cloud environments. James Christiansen of Netskope discusses how CISOs can respond to - and expect further - change.
Security operations teams are adding automation to make their lives more comfortable and their organizations safer. The challenge, however, is that SOC managers are still unable to quantify and demonstrate the value of automation to senior executives and other stakeholders.
An increasingly hostile threat landscape,...
The cybersecurity threat landscape is evolving as a result of the growth of the internet of things, the explosion in the use of the cloud and many other factors. Protecting data is this environment requires a "war time" mentality.
Can you lead board-level initiatives to understand how data and money flow through...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.co.uk, you agree to our use of cookies.