Mike Hamilton, founder and CISO of CI Security, followed an unusual path that led him to a career in cybersecurity. He says those who, like him, lack a formal education in security can build successful CISO careers.
Organizations continue to rapidly migrate business applications from datacenters to the cloud, utilizing new technologies such as serverless, containers, and machine learning to benefit from increased efficiency, better scalability, and faster deployments from cloud computing.
The 2020 AWS Cloud Security Report is...
Controlling, monitoring, and auditing privileges and privileged access—for employees, vendors,
systems, applications, IoT, and everything else that touches your IT environments is essential for
protecting against both external and internal threat vectors, and for meeting a growing list of
compliance...
Selim Aissi is a respected, veteran CISO who has deep experience in technology, management and financial services. In this exclusive fireside chat, he opens up on a range of hot topics, including how to defend against new DDoS and ransomware variants and vectors.
Multi-cloud and hybrid cloud solutions are great enablers for organizations, but managing IAM across multiple entities that are ever expanding in capability and use? Big challenges. But here's an opportunity to re-do enterprise IAM. Join Tom Malta of Navy Federal Credit Union for insight on business requirements,...
Cloud security trends like “shift-left security” and “DevSecOps” refer to new strategies and paradigms that help organizations keep workloads secure in the age of cloud-based, scale-out, constantly changing applications and infrastructure.
Many in IT, security, and development probably understand what these...
What really makes a "strong" password? And why are your end-users tortured with them in the first place? How do hackers crack your passwords with ease? And what can/should you do about your authentication methods?
For decades, end-users have borne the brunt of the password tyranny, a result of the IT industries'...
CISOs are playing an even more critical role as a result of the proliferation of supply chain attacks, a surge in the use of insecure IoT devices and other emerging risks, says Lt. Gen (retired) Rajesh Pant, national cybersecurity coordinator at the Prime Minister's Office for the Government of India.
Your cloud journey is unique, but a new guide shows there are common patterns that steer you to the best approach for a successful outcome.
Learn which cloud adoption pattern your organization aligns with, key risks, recommendations and important questions to ask yourself at each stage of your journey.
This 2020 Gartner guide recognizes the importance of both manual and automated NDR capabilities and why enterprises should determine early on which response strategy best meets their security goals.
Learn why network detection and response (NDR) must be a core component of any security strategy in today’s dynamic...
To enhance organizations' security postures in the year ahead, CISOs must strengthen authentication processes, increase the use of network segmentation tools and deploy effective threat intelligence capabilities, two CISOs recommend.
The shortage of trained cybersecurity workers has substantially declined this year as many more individuals entered the field, says Clar Rosso, CEO of (ISC)², the U.S.-based nonprofit association that offers training to cybersecurity professionals.
An enterprise's cross-functional groups responsible for the business growth and brand reputation should be held equally accountable for cybersecurity. That's the view of a CISO and a CTO who participated in a fireside chat at ISMG's recent Virtual Cybersecurity Summit.
India's urban cooperative banks need to take a holistic approach to build a security governance structure, opt for an ASP services model and map their business-critical risks to comply with the RBI's security posture guidelines, according to a panel of experts.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.in, you agree to our use of cookies.