Elvis Chan is one of the FBI's foremost experts on election cybersecurity. And as the US marches toward the November presidential election, he is laser-focused on protecting the vote from foreign influence.
Joseph Krull, an analyst with Aite Group recommends that vendors at RSA Conference should focus on how they integrate with the life of a CISO, rather than fixing point solutions.
Deception technology has moved from being an emerging technology to a more mainstream security control, say Tony Cole, and Carolyn Crandall of Attivo Networks.
The latest edition of the ISMG Security Report discusses the developing definition of "Insider Risk." Plus, Former DHS Secretary Michael Chertoff on U.S. 5G rollout plans; Cloud Security Alliance on containers and microservices.
RSA 2020 touched on a number of topics, including the security of elections and supply chains, plus AI, zero trust and frameworks, among many others. But from sessions on cryptography, to this year's lower attendance, to the antibacterial dispensers dotted around venues, concerns over COVID-19 also dominated.
It's relatively easy to list an enterprise's cybersecurity priorities for 2020. But who owns them? What are the hurdles to completing these projects? These can be tougher questions to answer, says Ellen Sundra of Forescout.
Remote workers, connected devices, cloud services and infrastructure - these are the elements of the new workplace. Now, how do you secure it? That's the challenge discussed by David Wagner, CEO of Zix.
Out with the old SOC, in with the new. Respond Software CEO Mike Armistead describes the elements of the modern SOC and how to re-think security monitoring and incident response.
What is the state of cybersecurity in the energy sector, and what are some of the myths and realities about its top threats? Sean Plankey of the US Department of Energy addresses these questions.
Ten years since he coined the term "zero trust," John Kindervag, field CTO of Palo Alto Networks, sees CISOs increasingly being faced with the challenge of having to implement the "never trust, always verify" model across increasingly complex IT environments, including cloud and IoT.
Marc Rogers has been a hacker since the 1980s - notable as organizer of DEF CON - and he is pleased to see his unique set of skills now embraced by the industry and being used to make cybersecurity smarter and easier to use.
Enterprises have such product sprawl in their security stacks today, it's hard to establish - much less maintain - any degree of visibility. Joe Partlow of ReliaQuest discusses how to improve visibility, as well as how to train security teams via simulated attacks.
Edna Conway, who recently joined Microsoft Azure, has been called the "mother of value chain security architectures." She talks about the platform economy and what that means for addressing security and third-party risk.
Passwords are the access point to almost every system in our environment. Can they ever truly be replaced? John Bennett of LogMeIn talks about the steps necessary to create a secure, passwordless login experience.
True or False: Quantum computing will break cryptography as we know it today? RSA CTO Zulfikar Ramzan shares his thoughts and opens up on the trends he sees driving the cybersecurity marketplace in the decade ahead.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.