Enterprises grapple with a deluge of vulnerabilities, misconfigurations and IT hygiene gaps. An automated exposure management program helps prioritize and remediate risks, fostering collaboration between security and IT teams, says J.J. Guy, CEO, Sevco Security.
Legacy systems that coexist with modern cloud-based applications complicate the arduous process of implementing cybersecurity measures. "When you get a company that is over 100 years old, you get some things that came along at different eras of the business," said Vaughn Hazen, CISO of CN Rail.
The challenges of securing proprietary data within AI models and the paradigm shift in enterprise security are brought about by the widespread adoption of AI models. Aaron Shilts, president and CEO, NetSPI, discusses the risks posed by AI and the importance of continuous security assessments.
From the RSA Conference in San Francisco, four ISMG editors discussed highlights from the first day including the keynote on global threats by U.S. Secretary of State Antony Blinken, enterprise risk management concerns and the role of the board, and the latest technology innovations.
Small and medium-sized organizations have a "resounding need" for SASE as part of managed security services, and that's why SonicWall has added SASE to its security stack, said Bob VanKirk, the company's president and CEO.
Tossing the word "cyber" onto something doesn't automatically mean it should belong to the chief information security officer. Cyber risk belongs to everyone in an organization, said Alicja Cade, director, financial services, Office of the CISO, Google Cloud.
As hospitals and other healthcare providers continue to digitize all kinds of very sensitive healthcare information, these organizations are a becoming an increasingly attractive target for threat actors for a variety of reasons, said Bipul Sinha, co-founder, chairman and CEO, Rubrik.
The fifth annual Sophos State of Ransomware Report combines year-on-year insights with brand-new areas of study. It includes a deep dive into ransom demands and ransom payments and shines new light on the role of law enforcement in ransomware remediation.
Traditional cybersecurity and insurance providers have struggled to meet the specific needs of SMBs, failing to offer cost-effective solutions tailored to their requirements, according to Thom Dekens, chief business officer and general manager, At-Bay Security.
The era of generative AI tools and technologies has upended the global cybersecurity landscape. As hybrid and remote work increasingly become the norm, organizations are discovering their digital footprints extend far beyond the confines of their physical facilities, warns ZeroFox CEO James Foster.
A New York-based mobile healthcare services provider told the U.S. Securities and Exchange Commission that it recently suffered a cyber incident involving data theft, including health information of an unspecified number of individuals, from the firm's U.S.-based ambulance transportation business.
From the RSA Conference in San Francisco, three ISMG editors examined all the hype around artificial intelligence, including the latest AI-enabled cybersecurity solutions, the AI tactics that adversaries are using and the burning question at RSA: Who's in charge of AI in today's enterprises?
U.S. healthcare interoperability - across doctors, dentists, other healthcare providers and vendors that support them - brings new opportunities for hackers to monetize disruption of badly needed services, said Kyle Hanslovan, CEO, Huntress.
The need for SASE is growing as more organizations realize that the majority of their workforce will remain remote and there is no longer a "safe network" within a building but rather "all networks become an external network," said David Batty of iboss.
Sumedh Thakar, president and CEO, Qualys, explores the shift in cyber risk management from a tools-focused approach to strategic risk quantification, highlighting the key role of CISOs in driving this transformation. Boards are now recognizing that "cyber risk is a business risk," he said.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.