The new Cyberspace Solarium Commission released its highly anticipated report this week that offers more than 75 U.S. cybersecurity recommendations and calls for sweeping reforms. Here's a look at the key proposals.
The RSA cybersecurity conference once again this year gathered tens of thousands of individuals to network and attend keynotes and briefings on topics ranging from election security and genomics to privacy and cybercrime. Here are 20 visual highlights from this year's event.
Threat intelligence feeds are evolving, but Rob Cataldo of Kaspersky North America says it's important to put all this data into context to create better enterprise security.
Supply chain risk, security in the cloud, zero trust - these were three of the hottest topics at RSA Conference. And they were discussed candidly - and with some humor - when thought-leaders Edna Conway and Wendy Nather entered ISMG Studios.
The good news is: Organizations are embracing the cloud, and that's a boon to velocity and digital transformation. The bad news: Visibility and governance take a huge hit. Matt Kraning, CTO and co-founder of Expanse, discusses this challenge and how to improve cloud governance.
Mobility, connectivity and the infrastructure-less IT environment - they add new degrees of difficulty to cybersecurity. Michael Covington of Wandera shares strategies for securing this modern workplace.
Do CISOs need to have deep technical proficiency? Many information security professionals will say: "Of course." Ask them which skills rank highest, however, and you'll hear words such as "communication" and "building trust," says Thom Langford, director of (TL)2 Security.
No advanced hacking skills required: The burgeoning cybercrime-as-a-service economy continues to make it easy for aspiring cybercriminals to procure highly automated, easy-to-use and effective attack tools to fuel illicit profits, says Liv Rowley, a threat intelligence analyst at Blueliv.
For the past year-plus, RSA and ISMG have teamed up for a series of North American cybersecurity roundtables dedicated to digital risk management. RSA's Ben Smith shares highlights of discussions about third-party risk, privacy and multi-cloud transformation.
Deception technology has moved from being an emerging technology to a more mainstream security control, say Tony Cole, and Carolyn Crandall of Attivo Networks.
RSA 2020 touched on a number of topics, including the security of elections and supply chains, plus AI, zero trust and frameworks, among many others. But from sessions on cryptography, to this year's lower attendance, to the antibacterial dispensers dotted around venues, concerns over COVID-19 also dominated.
Remote workers, connected devices, cloud services and infrastructure - these are the elements of the new workplace. Now, how do you secure it? That's the challenge discussed by David Wagner, CEO of Zix.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.