SpyCloud is out with its annual credential exposure report, and the bad news is: Password reuse continues to leave enterprises open to breach and account takeover. Chip Witt of SpyCloud shares some of the key takeaways and analysis.
From buzzword to practical application, artificial intelligence quickly has made an impact in cybersecurity - particularly in the security operations center. Bryce Schroeder of ServiceNow projects how AI and automation will continue to influence SOCs - and the analyst's role.
Threat intelligence and visualization technology can play huge roles in improving vulnerability management. Mieng Lim of Digital Defense outlines the potential benefits.
Zero trust is not a product or a destination, but rather a journey requiring organizations to practice good security hygiene, continuous monitoring and detection, as well as rapid incident response backed by high levels of automation, says Shehzad Merchant, chief technology officer of Gigamon.
At the core of cybersecurity, every leader has just one ultimate question: 'Have we been compromised?" And yet that remains the most difficult question to answer with certainty, says Ricardo Villadiego, CEO of Lumu Technologies.
With countless devices and services all connected to each other without clear perimeters, verifying user identities and controlling their access to sensitive resources becomes more important than ever, but also far more difficult to achieve, says Hed Kovetz of Silverfort.
Barracuda Networks has released the findings of its latest survey on public cloud security. Fleming Shi, the company's chief technology officer, describes what is holding organizations back from fully embracing the public cloud.
Indicators of compromise are important. But what if you could also detect patterns of behavior that tip you off before a crime? This is where Cybereason's Sam Curry is trying to shift the focus.
Digital convergence is driving a shift in the security landscape for operational technology. Fortinet's Jonathan Nguyen-Duy discusses the manifestations of this shift and how to address them.
Not so long ago, many were confused about how security and privacy differ, but that has been rapidly changing, thanks to regulations such as the European Union's General Data Protection Regulation and California's Consumer Privacy Act, says attorney James Shreve, a partner at Thompson Coburn LLP.
The threat of the coronavirus outbreak emphasizes how remote access to workplaces is critical in business continuity. Stan Lowe of Zscaler discusses "zero trust" in the context of pandemics.
Ransomware-wielding attackers - aided by a service economy that gives them access to more advanced attack tools - are increasingly targeting organizations rather than individuals to shake them down for bigger ransom payoffs, says McAfee's John Fokker.
Development teams are increasingly building and deploying for the cloud, but DevOps practices too often fail to account for what happens after applications go from development into production and maintenance - and the ongoing security challenges they will face, says Jake King, CEO, of Cmd.
Global enterprises have spent a decade fighting the cybersecurity skills shortage, and Exabeam CEO Nir Polak has ideas about how automated tools can help fill the gap.
The ever-changing threat landscape, with new cyber intrusions and nation-state threats, means organizations must strive to achieve "future proof" security. But what are the key elements of this effort? This keynote session offers insights on building better defenses and creating an effective cybersecurity strategy in...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.