The attack surface is expanding and adversaries are more sophisticated. Complexity is mounting and the pace is relentless.
As a security leader, it can be hard to know where to focus first.
Yet in the midst of this threat landscape overload, one challenge presents a greater risk than any other. And more often...
Government leaders are increasingly calling on cybersecurity researchers to better inform policymakers and are urging businesses to pay more attention to their in-house security teams, according to presenters at this week's Black Hat Europe virtual conference.
Security education for employees is worthless unless it's highly targeted, says Angela Sasse, a professor of human-centered security at Ruhr University Bochum in Germany, who offers tips.
This webinar with Osterman Research offers insights into critical issues network managers need to address to gain visibility and secure their network traffic.
Network Detection and Response (NDR) solutions provide the necessary visibility not available in SIEM or EDR solutions. Watch this webinar to complete your security architecture.
Encryption keeps the internet secure, but it also gives bad actors the perfect hiding place. Join Gigamon and ISC2 for a deep dive into the latest encryption protocol, TLS 1.3, to learn what's different and what advantages it offers in the constant effort to stay one step ahead of threats.
Cybersecurity leaders are not immune to the forces of digital transformation. In fact, Nicolas Casimir, CISO EMEA with Zscaler, says the role is forever changed by the business and technologies evolutions we have seen in 2020.
President-elect Joe Biden on Monday announced that two former Obama-era officials are his nominees to head the U.S. Department of Homeland Security and the Office of Director of National Intelligence.
Businesses throughout France that are embracing the cloud are feeling a shift in the world of networking and security. Data and workloads no longer reside in on-premises data centers. With this change, security and network management are closer than ever. Businesses need speed, visibility, security and reliability...
Identity is the new perimeter, cloud is the new environment. What are the threats to watch and technologies to embrace? Join this panel of leaders as they discuss:
The new threat landscape
Identity, cloud, endpoint security and other key priorities for 2021
Leadership demands for the new hybrid workforce
Boeing CISO Howard Whyte started his job just as the world shut down to COVID-19. Since then, he's secured the workforce, ensured resiliency, grown his team and got to know peers, partners and board members - all from quarantine. In this exclusive keynote, he discusses:
Responding to 2020's challenges
Concerns...
Twitter has hired network security expert Peiter Zatko to serve in the newly created position of head of security following a series of high-profile cyber incidents. Zatko, known as "Mudge," gained fame as a member of the ethical hacking group "Cult of the Dead Cow" and worked for the government and Google.
Information Security Media Group's members-only CyberEdBoard CISO community has opened its doors, giving senior cybersecurity practitioners a private ecosystem to exchange intelligence, gain access to critical resources and enhance personal career capabilities in collaboration with peers around the world.
President-elect Joe Biden's approach to cybersecurity will likely mirror that of his old boss, former President Barack Obama. Expect Biden's White House to increase pressure on Russia, practice greater involvement in cybersecurity and return to higher levels of coordination than President Trump demanded.
COVID-19 accelerated everything else digital; why not fraud, too? In this latest CEO/CISO panel, cybersecurity leaders talk frankly about the pace and scale of new fraud schemes from business email compromise to card not present to insider risk.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.