Ordr has tapped Jim Hyman, a former COO and Zscaler's first non-engineering hire, to fill the CEO job. Hyman is tasked with deepening the connected device vendor's bond with security stalwarts like Cisco and CrowdStrike and moving beyond opportunistic partnerships in favor of a concerted strategy.
The progress in modern medical care is remarkable. Increasing development of
Internet of Things (IoT) devices for the medical industry is a key factor in that
progress. In recent years, pacemakers, defibrillators, and other medical device
implants have gotten smaller and smarter.
While medical devices bring a host...
Digital transformation shows no signs of slowing down, even in a post-pandemic hybrid workforce. In fact, this new business paradigm continues to place an increased resource strain on security teams and cybersecurity debt permeates organizations. A recent survey of IT security decision makers uncovered that more than...
Enterprises just starting their cloud journey should take a zero trust approach in everything they do, says Ajay Kumar Dubey, channel partner with Forcepoint. Zero trust should secure content, access, data and user activities, and above all, it should be "foolproof and simple to use," he advises.
This whitepaper addresses questions raised by security leaders that want to better understand their organization’s development environments, the risks development tools expose and the best practices and approaches for securing them, across the software supply chain. Three focus areas are examined which address how...
Four ISMG editors discuss important cybersecurity issues, including the hot topics at ISMG roundtable discussions - such as challenges around software supply chain security, highlights from ISMG's upcoming Healthcare Summit, and how some cybersecurity vendors are creating their own venture funds.
Ransomware-as-a-service, supply chain attacks and the Russia/Ukraine war - they all are factors behind the growing need for digital executive protection outside the traditional workplace. Chris Pierson of BlackCloak shares new research and insights.
Gartner projects that in 2022, Endpoint Protection Platforms will take the #1 spot in information security software spending, reaching $15.9B and will continue increasing gap with the second largest segment throughout 2026 reaching $29.2B.1
Will this increase in spend result in a decrease in successful endpoint...
CISOs appreciate the SASE approach, which allows them to incorporate all their existing investments - often made in a phased manner - to undergo the digital transformation, says Sid Deshpande, field CTO at Palo Alto Networks. He discusses how SASE can solve CISOs' problems.
Older consumers are considered a more vulnerable population. They are the best kind of customers, and cybercriminals know that. They are known for having better credit and more funds, tend to be more trusting, and lack familiarity with new digital technologies. Fortunately, there is a way to help financial...
Regulators should require all medical device makers to include a baseline of certain cybersecurity protections in their products and to build in a feature that allows safe vulnerability scanning of their devices, says researcher Daniel Bardenstein, a strategist at CISA.
The Data Divide spans sectors, organizations,
individuals and communities — and not for a shortage
of data but for a shortage of focus beyond “productivity,
efficiency and innovation.” But it doesn’t have to be that
way. There are interventions, new ways of working and
strategies for overcoming the Data...
With many countries opening up for tourists, the airline industry is seeing a rise in fraudulent credit card transactions, says Johan Waldeck, senior forensic investigator at Comair Limited, a leading South African airline company.
They are high-profile, they have access to your company's most vital information, they rely on unsecured personal devices - and your cyber adversaries are targeting them. They are your board members, and Chris Pierson of BlackCloak has ideas on where and how you can better secure these leaders.
The Israeli government paid a visit on Wednesday to NSO Group, the company whose spyware is alleged to have been covertly installed on the mobile devices of journalists and activists. The visit comes as Israel faces growing pressure to see if NSO Group's spyware, called Pegasus, has been misused.