Not long ago, Sam Kassoumeh of Security Scorecard has to explain the concept of cybersecurity ratings. Now he sees the practice being used throughout enterprises for other, evolving business cases.
Enterprise security leaders need to embrace a new "culture of security," says Mordecai Rosen of CA Technologies. But how does he define that, and what role does automation play in enabling it?
We have been talking about the cybersecurity skills gap for a decade, but the pain is truly being felt now as businesses churn out new apps with insufficient security, says WhiteHat Security's Craig Hinkley. What is machine learning's role?
Thirty-four companies have signed on to the Microsoft-led Cybersecurity Tech Accord, which is aimed at protecting civilians from cybercriminal and state-sponsored attacks. The agreement crucially includes a pledge not to help governments with cyberattacks
Managing third-party risks is more critical than ever, says Tom Turner of BitSight Technologies, who discusses the urgency of communicating that to the board.
When it comes to building an effective cybersecurity team, it isn't just about acquiring the right technology and business skills, says LinkedIn CISO Cory Scott. It's also about obtaining the right people who have defined their own personal narrative.
It's a quandary: How does one convey the urgency of cybersecurity without falling into the trap of spreading fear, uncertainty and doubt? Diana Kelley, cybersecurity field CTO at Microsoft, shares strategies.
What are the strengths and weaknesses of U.S. federal security strategy? Sean Frazier of Duo Security, provides an assessment and addresses why adaptation to the cloud is paramount.
Venture capital firm Trident Cybersecurity has rebranded itself as ForgePoint Capital, and Managing Director Alberto Yepez says he is bullish on the market and its emerging focus on the intelligence operations center.
As GDPR and other global regulations put a premium on data governance, organizations focus increasingly on the evolution of data loss prevention. Dave Karp of Digital Guardian outlines what this means.
The U.S. and U.K. warned Monday that Russian hackers have compromised critical internet infrastructure with the aim of spying, extracting intellectual property and gaining footholds for future cyberattacks.
Uber has agreed to stricter monitoring by the U.S. Federal Trade Commission following its concealment of a 2016 data breach while it was negotiating with the agency for a settlement tied to a separate, yet similar, breach two years prior.
Email is still the most common attack vector as a preferred method utilized by attackers because of the overwhelming effectiveness. Phishing attacks have only been increasing and evolving to bypass modern security appliances, endpoint protection, and user awareness training.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.