The average tenure of a CISO can be brief - especially in the wake of a breach. What should security leaders do from day one to get a good handle on the job? Joel de la Garza, CISO of Box, offers career advice.
In an in-depth interview, Golok Simli, CTO at India's Union Ministry of External Affairs, sizes up the shortcomings of the Information Technology Act, 2000 and discusses the ongoing challenges involved in protecting privacy.
As corporate information silos fall, traditional approaches to governance, risk and compliance are giving way to the new category of integrated risk management solutions. Vivek Shivananda, CEO of Rsam, discusses the evolution.
Taking a threat-centric approach - trying to defend against every threat out there - is a recipe for failure in the current threat landscape, says RSA CTO Zulfikar Ramzan, who advocates a business-driven approach instead.
The Facebook/Cambridge Analytica scandal is far from over. Attorney Steven Teppler, co-counsel on the first class action case filed in the matter, discusses the likely repercussions.
"Digital transformation" is the theme of the year, but it comes with specific cybersecurity challenges - and they put a new burden squarely on the shoulders of the CISO, says Fortinet's Jonathan Nguyen-Duy.
Enterprise security leaders need to embrace a new "culture of security," says Mordecai Rosen of CA Technologies. But how does he define that, and what role does automation play in enabling it?
We have been talking about the cybersecurity skills gap for a decade, but the pain is truly being felt now as businesses churn out new apps with insufficient security, says WhiteHat Security's Craig Hinkley. What is machine learning's role?
Thirty-four companies have signed on to the Microsoft-led Cybersecurity Tech Accord, which is aimed at protecting civilians from cybercriminal and state-sponsored attacks. The agreement crucially includes a pledge not to help governments with cyberattacks
For many organizations, the cloud has become the sole route to market for new application deployment. It affords greater agility and scalability, higher performance, and faster access to innovative technologies, all of which help a business gain a competitive edge. As a result, data and applications now reside in a...
The security perimeter once familiar to the enterprise has become incredibly fragmented. Data and applications reside everywhere: on the network, endpoints and in the cloud. The cloud, in particular, is seeing huge growth with enterprises adopting these environments at a rapid pace. According to Gartner, 55 percent of...
Although endpoints are typically the targets, ransomware can spread rapidly across a network in spite of layers of security and impact the
entire organization. Ransomware threatens to derail network operations teams' efforts to ensure optimal performance and security. Nearly three- quarters of network teams spend up...
Palo Alto Networks provides an enterprise security platform that help its customers protect and defend their data assets with highly effective tools at the network, data center, and endpoint levels. Palo Alto Networks commissioned Forrester Consulting to conduct this Total Economic Impact (TEI) study to examine the...
Managing third-party risks is more critical than ever, says Tom Turner of BitSight Technologies, who discusses the urgency of communicating that to the board.
To effectively understand the impact of security programs and communicate changes to key decision makers, companies need tools such as security ratings that provide a quantifiable, objective view of cybersecurity performance over time.
In this session, you will learn about:
The importance of using security ratings...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.in, you agree to our use of cookies.