Security teams are doing more with less while facing an increased attack surface as millions transition to a work-from-home model. For those tasked with protecting the network, it's time to rethink strategy.
As our new whitepaper makes clear, adopting Zero Trust is an effective first step toward agility and...
Linda Gray Martin and Britta Glade, organizers of the three-day RSA APJ Conference that starts July 15, describe their efforts to create a virtual event to replace the usual gathering and provide an overview of educational content.
As defined by Gartner, a secure access service edge (SASE) supports cloud-enabled organizations by combining networking and network security services into a single cloud-delivered offering.
With the common framework a SASE provides, organizations can simplify management, get consistent visibility, and maximize...
Data and users are everywhere: on your network, in the cloud and working remotely. The result is an incredibly complex network environment that, historically, has significantly increased your business risk.
You can minimize this risk with the right next-generation firewall (NGFW) platform - one that leverages a...
The internet of things (IoT) is exploding, and enterprise IoT is seeing massive growth as well. Every modern organization is using IoT devices to help run their business. Although IoT opens the door to unprecedented connectivity as well as innovative approaches and services, it also brings with it new cybersecurity...
Greg van der Gaast, head of information security at the University of Salford in the United Kingdom, has strong opinions on why some security investments aren't reaping maximum benefits. "We are addressing problems too far downstream," he says.
Enterprises need to move away from manual threat detection methods to leverage artificial intelligence, which can help boost defenses, says Dr. Jassim Haji, president of Artificial Intelligence Society, Bahrain Chapter.
Organizations deploying deception technology must make sure to integrate it with other technologies to reap the full benefits of intrusion alerts, says Anuj Tewari, global CISO at IT Services HCL Technologies.
Measuring and communicating the value of a cybersecurity program is more important than ever. Colin O'Connor, COO of ReliaQuest, previews the topic for an upcoming virtual roundtable.
Southeast Asia has become a hotbed for cybercrime activities, says Anthony Bargar, former deputy CISO of the U.S. Department of Defense, who says enterprises in the region need to take a collaborative defense approach to respond to this new threat environment.
When security teams apply agile methodologies, they are better able to deliver value and can more easily pivot and change plans, says Kevin Fielder, CISO of Just Eat, a British online food ordering and delivery service with operations in 13 countries.
To battle against a surge in cybercrime during the COVID-19 pandemic, enterprises need to take several steps, including periodic vulnerability and risk assessment tests and regular audits, says Rajan Pant, founder of IT-SERT of Nepal. Pant also is calling on the government to take action.
Stress levels for CISOs are increasing as they deal with emerging security issues during the COVID-19 pandemic. So it's more important than ever to make communication and diplomacy a top priority to help facilitate a team approach to security, says training specialist Keil Hubert.
Corporate culture can have a big impact on an organization's ability to achieve cybersecurity objectives, says Jessica Barker, chair of ClubCISO, a private members forum for European information security leaders, who provides insights on gauging an organization's security maturity.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.in, you agree to our use of cookies.