An estimated half of all ransomware infection victims give in to criminals' ransom demands, thus enticing attackers to refine and continue their campaigns, warns Intel Security's Raj Samani in this video interview.
DDoS attacks are on the rise, and they come across multiple vectors. In this video interview, Paul Nicholson of A10 Networks describes how organizations can defend against DDoS - and why SSL traffic inspection is a must.
The security industry has been too focused on managing identities - and not focused enough on privileged access, says Andy Vallila of Dell Security Solutions. In this video interview, he discusses the level of visibility organizations need for privileged accounts.
Malwarebytes has long been a force in the consumer space, but now its focus is on enterprise breach remediation. In this video interview, Pedro Bustamante explains the enterprise strategy and discusses proactive malware hunting.
As a vice president at IBM Security, Caleb Barlow has been a leader in the company's strategic acquisitions. What does he look for in a potential venture, and how is IBM Security taking shape to respond to the latest threats? Find out in this video interview.
The discovery of a serious flaw in Linux's GNU C Library demonstrates just how long serious flaws can persist in code that underpins the Internet infrastructure, warns Dan Kaminsky of White Ops in this video interview.
After years of being kept in the background, privacy has taken center stage in security discussions. In this video interview, Michelle Dennedy, chief privacy officer at Cisco, discusses the impact of new regulations and the issue of encryption backdoors.
Phil Reitinger, president of the Global Cyber Alliance, wants to make one thing clear: This new group is not a coalition of the willing; it's a coalition of the angry. How, then, does the alliance plan to channel its powerful energy? Find out in this video interview.
A year after retiring as chair of RSA, Art Coviello returns to the RSA Conference and, in this video interview, offers candid thoughts on the state of the industry, the global threats that concern him most and the significance of the legal struggle between Apple and the FBI.
The keys to the digital kingdom are too easy to steal through malware and social engineering. What can security leaders do to help raise their organizations' level of privileged access management? Ken Ammon of CA Technologies offers insights in this video interview.
Security organizations increasingly are hampered by the complexity of managing so many disparate controls. What they need, Fortinet's John Maddison says in this video interview, is an integrated platform that can enable a more strategic approach to cybersecurity.
Yes, security leaders need greater visibility into their systems and the internal/external threats. But they also need to improve how they share information from this view, says Gautam Aggarwal of Bay Dynamics in this video interview.
Financial services firms and healthcare institutions have been at the forefront of adopting encrypted email, simply because so much vital and sensitive information today naturally flows via email, Dave Wagner, CEO of ZixCorp, says in this video interview.
Behind many of the biggest breaches is a third-party intrusion. And yet far too few organizations have an effective third-party risk management program in place, says Norman Menz III, co-founder and CTO of Prevalent, in this video interview. How must they address this gap?
Keeping up with today's security and regulatory demands requires a centralized and integrated security platform, necessitating a move away from single-point security products and solutions, Dr. Richard Ford of enterprise security firm Forcepoint says in this video interview.