Increasingly, SonicWall is focused on the midmarket, and CEO Bill Conner wants to help ensure that smaller and midsized enterprises have appropriate visibility into the threat landscape - the threat actors, as well as whom they are targeting.
Corporate espionage appears to be the motive behind cyberattacks targeting a variety of medical-related equipment and systems, researcher Jon DiMaggio of Symantec says in an in-depth interview about the activities of a hacker group the company has dubbed "Orangeworm."
Great news: "SunTrust to offer free identity protection ... at no cost on an ongoing basis." Of course, nothing comes for free, at least for 1.5 million customers of the Atlanta bank, whose personal details may have been sold to criminals by a former employee.
Incident response is a critical pillar of an effective endpoint security program, one that will gain importance as GDPR enforcement comes into play on May 25. Organizations must be ready to react if and when an incident occurs in order to meet the stringent requirements that apply during an incident.
In today's extended enterprise, with organizations leveraging supply chains and the cloud, microsegmentation has become a hot network security technology. Tom Patterson of Unisys discusses the trend, as well as behavioral biometrics.
After years of focus, the needle is moving positively toward improving medical device security. But what about the growing cybersecurity issues associated with enterprise IoT? Mac McMillan of CynergisTek shares his concerns.
Hot cybersecurity trends under discussion at this year's RSA Conference include artificial intelligence, facial recognition, protecting not just data but also knowledge, as well as rapid data breach response, says Chris Pierson, CEO of Binary Sun Cyber Risk Advisors.
Blockchain is high on the hype meter in 2018, but Gartner's Avivah Litan is encouraged by practical applications of the technology to secure financial transactions, protect identity and help organizations fight fraud.
Beset by increasingly aggressive threat actors, many security leaders have decided their best defense is a stronger offense. John Wilson of Agari offers insights into the active defense movement - including the ethical and legal concerns associated with it.
The terms artificial intelligence and machine learning are in abundant supply at this year's RSA Conference. Sam Curry of Cybereason cut through the hype to explain how he sees these technologies augmenting cybersecurity.