Effective cyber risk management of vendors is critical to the success of organizations that are increasingly relying on these third parties, says Dave Stapleton, CISO of CyberGRX, who describes the importance of using a "true" third-party risk exchange.
What are some challenges of shifting on-premises PAM to the cloud, and how should one go about it? Peter Gankin, head of identity and access management at Takeda, a Japanese multinational pharmaceutical company, shares his views.
Greg Murphy, CEO of Ordr, says there are three topics healthcare senior leaders and board members keep asking about: ransomware, ransomware … and ransomware. He discusses how healthcare entities are addressing their biggest threats, IoT devices, and the implications of the PATCH Act.
CISA says Chinese state-sponsored threat actors are exploiting known vulnerabilities to target public and private companies in the United States, and a related joint advisory from CISA, the FBI and the NSA describes how major telcos and network service providers have been exploited since 2020.
For CISOs, it's critical to not implement security without first carefully considering the user's experience, says Bernardo Vasquez, advisory CISO in the strategic client practice of Palo Alto Networks. He explains why and discusses other topics, including ZTNA 2.0.
As enterprise IT infrastructures become more complex, the faster vulnerabilities can be identified - and especially remediated - the better, says Michael Assraf, CEO and co-founder of Vicarius. He discusses why speed is critical to the vulnerability remediation process.
Most publicly traded security vendors specialize in one technology category, but Palo Alto Networks has built out industry-leading practices around network security, cloud security and security operations. CEO Nikesh Arora discusses this unique path.
SSNDOB, a darknet marketplace selling stolen Social Security numbers and birthdates, has been shut down, says the U.S. Department of Justice. The takedown was the result of a multiagency effort involving the IRS-CI, the FBI, the DOJ, and law enforcement agencies of Cyprus and Latvia.
Individuals who work on developing software - even if not employed by a technology firm - are under more stress than ever before, says Sonahi Shah, chief product officer at Invicti Security, who explains the ever-increasing pressure to develop secure code.
In the digitally transformed world, APIs suddenly are among the hottest attack vectors. Yet too many organizations fail to even have visibility into their API inventory, much less security. Oz Golan, CEO of Noname Security, discusses API security trends.
The aftermath of digital transformation is that we produce more data than ever on more devices in more diverse locations. Now, how do we convey the urgency to protect this data during its whole life cycle? Drivelock SE CEO Anton Kreuzer addresses this challenge and more.
As the next generation of SecOps starts to take shape in enterprises globally, emerging threats call for advanced detection and response, says John Ayers of Optiv. He describes the methodology, its roots in engineering and how it all starts with the threat.
The world is a much different place since the previous in-person RSA Conference - and so is the cybersecurity marketplace. Alberto Yépez of Forgepoint Capital shares his view of the state of the industry and the market forces that may cause further change in 2022.
Recently CybelAngel CEO, Erwan Keraudy, and CRO Jeff Gore, sat down with Mathew Schwartz, Executive Editor of DataBreach Today to discuss ways for businesses to protect their growing external attack surface.
Art Coviello, former CEO of RSA and current partner with Rally Ventures, describes the cybersecurity industry trends he's watching closely as we hit the midway point of 2022, as well as which emerging technologies have not quite evolved in the way he might have anticipated.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.co.uk, you agree to our use of cookies.