Increasing stress levels for cybersecurity professionals pose a serious organizational security risk, says Neal O'Farrell, founder of the PsyberResilience Project, a mental health advocacy group.
He'd worked at NASA, Visa and Time Warner and stepped in at Home Depot after it was hacked in 2014. But nothing quite prepared Jamil Farshchi for the spotlight he'd face when he took over as CISO at Equifax after its massive 2017 data breach. He discusses how the Equifax security organization has rebounded.
The COVID-19 pandemic is forcing big businesses to rethink their security plans. For example, the National Football League is experimenting with "zero trust" architectures, while Jet Blue is focusing on more frequent risk assessments.
Who watches the penetration-testing testers? Questions are circulating over how some organizations train their employees for the CREST pen-testing certification after some leaked internal documents appeared to contain material from past tests.
The SANS Institute, which is known for its cybersecurity training courses, is now planning to turn its own data breach into a teachable moment for its membership.
Data is the lifeblood of modern organizations - and modern security operations. Today's SecOps teams must be more data-driven, leveraging automation, machine learning and other tools to quickly identify threats and reduce response times, while freeing up critical engineering and analyst resources. Splunk CISO Yassir...
Data protection and data privacy are the cornerstones of trust between businesses and their clients. Encryption and managing the keys to the kingdom are critical components to maintaining that trust, preventing data breaches, and avoiding regulatory penalties. However, the technology used to manage encryption is often...
Ask a group of security analysts about the challenges of working in cybersecurity, and you'll likely hear some common themes, like a high volume of security alerts, too many security point-products to manage, and a shortage of skilled cybersecurity talent.
Many teams have turned to security orchestration,...
2020 has brought seismic change to all sectors, and cybersecurity leaders have been in the driver's seat in helping their enterprises adapt. Join this exclusive panel for unique insight into:
How to respond when your business faces historic transformation;
Challenges posed by new threats, endpoint security...
The 2020 Vulnerability and Threat Trends Report Mid-Year Update
shows how criminals have taken advantage of the disruption caused
by the pandemic. While organizations were vulnerable and distracted,
hackers developed new ransomware samples and advanced existing
tools to attack critical infrastructure - including...
Paul Connelly has been CSO at HCA Healthcare for more than 18 years. But no year has been more trying than this one. What has he learned from the COVID-19 experience and the challenge of accelerating digital transformation amid a pandemic?
Somewhere out there, in a market crowded by over-qualified workers deluged by job offers, the next generation of CISOs is maturing. But how can CISOs train tomorrow's security executives when today's well-known security talent deficit makes it difficult to fill even the most basic roles?
Retaining cyber...
What are the biggest leadership lessons from the COVID-19 pandemic? And what will CEOs and CISOs look back on and say, "Why did we ever do things that way?" Those questions were posed to a panel of cybersecurity leaders, and here are their candid answers.
How are emerging technologies, such as quantum computing and Secure Access Server Edge, or SASE, shaking up cybersecurity? And how are cyber adversaries adapting to the changing times? Dr. Hugh Thompson, program committee chair for the RSA Conference, offers an analysis of trends.
The proverbial container genie is out of the bottle. Developers have widely embraced containers because they make building and deploying so-called cloud native applications
simpler than ever. Not only do containers eliminate much of the friction typically associated with moving application code from testing through...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.