Data is the lifeblood of modern organizations - and modern security operations. Today's SecOps teams must be more data-driven, leveraging automation, machine learning and other tools to quickly identify threats and reduce response times, while freeing up critical engineering and analyst resources. Splunk CISO Yassir...
Data protection and data privacy are the cornerstones of trust between businesses and their clients. Encryption and managing the keys to the kingdom are critical components to maintaining that trust, preventing data breaches, and avoiding regulatory penalties. However, the technology used to manage encryption is often...
Ask a group of security analysts about the challenges of working in cybersecurity, and you'll likely hear some common themes, like a high volume of security alerts, too many security point-products to manage, and a shortage of skilled cybersecurity talent.
Many teams have turned to security orchestration,...
2020 has brought seismic change to all sectors, and cybersecurity leaders have been in the driver's seat in helping their enterprises adapt. Join this exclusive panel for unique insight into:
How to respond when your business faces historic transformation;
Challenges posed by new threats, endpoint security...
The 2020 Vulnerability and Threat Trends Report Mid-Year Update
shows how criminals have taken advantage of the disruption caused
by the pandemic. While organizations were vulnerable and distracted,
hackers developed new ransomware samples and advanced existing
tools to attack critical infrastructure - including...
Paul Connelly has been CSO at HCA Healthcare for more than 18 years. But no year has been more trying than this one. What has he learned from the COVID-19 experience and the challenge of accelerating digital transformation amid a pandemic?
Somewhere out there, in a market crowded by over-qualified workers deluged by job offers, the next generation of CISOs is maturing. But how can CISOs train tomorrow's security executives when today's well-known security talent deficit makes it difficult to fill even the most basic roles?
Retaining cyber...
What are the biggest leadership lessons from the COVID-19 pandemic? And what will CEOs and CISOs look back on and say, "Why did we ever do things that way?" Those questions were posed to a panel of cybersecurity leaders, and here are their candid answers.
The proverbial container genie is out of the bottle. Developers have widely embraced containers because they make building and deploying so-called cloud native applications
simpler than ever. Not only do containers eliminate much of the friction typically associated with moving application code from testing through...
Based on a survey of 3,000 professionals in cloud architecture,
information security, DevOps and application development
located across five countries and five industries, this report will
help you make decisions about your own cloud transformation
or cloud use, so you can realize the full potential of...
U.S. prosecutors this week unsealed an indictment against the alleged hacker "Fxmsp" after his identity was revealed in a cybersecurity firm's report. That sequence of events has raised questions about information sharing and highlighted law enforcement's reliance on private cybersecurity researchers.
Security teams are doing more with less while facing an increased attack surface as millions transition to a work-from-home model. For those tasked with protecting the network, it's time to rethink strategy.
As our new whitepaper makes clear, adopting Zero Trust is an effective first step toward agility and...
Data has a definite lifecycle. Understanding that lifecycle and looking at data through the lens of that life cycle creates new ways of looking and thinking about data and create a language to understand and see new opportunities for the data the organization holds and also perhaps opportunities to dispose of data...
The internet of things (IoT) is exploding, and enterprise IoT is seeing massive growth as well. Every modern organization is using IoT devices to help run their business. Although IoT opens the door to unprecedented connectivity as well as innovative approaches and services, it also brings with it new cybersecurity...
This webinar will provide leaders inside and outside of contact centers with actionable recommendations and proven strategies to keep your organization and its' teams moving forward in our rapidly changing world.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.co.uk, you agree to our use of cookies.