Harold Moss, the CEO of Tautuk, has a background in building products, but many in cybersecurity do not come from a product background. In this interview with Brian Barnier, he discusses the importance of context, listening and collaboration for teams to understand creative and critical thinking.
Eighty percent of survey respondents say they either are well on the way or getting started toward becoming a "smart manufacturing company." Cloud migration, business resiliency and securing OT environments are among their priorities. Del Rodillas of Palo Alto Networks analyzes the survey results.
Fifty-three percent of survey respondents say cyberthreats became fiercer during COVID-19, and 17% say the pandemic disrupted their data security initiatives. These are among findings of a new survey sponsored by HelpSystems. Cary Hudgins analyzes the results and discusses how to put them to work.
Michael Lines is working with ISMG to promote awareness of the need for cyber risk management. As a part of that initiative, CyberEdBoard posts draft chapters from his upcoming book, "Heuristic Risk Management: Be Aware, Get Prepared, Defend Yourself." This chapter is "Recognize the Threats."
Sri Lanka-based Sujit Christy, group CISO at John Keells Holdings PLC, says his passion is empowering security practitioners with the right skills and knowledge and ensuring they speak the right language. He discusses cybersecurity adoption and enablement.
We look at cybersecurity largely focused on the immediate future. But educator Gary Henderson says we need to look a little further ahead. He makes the case for educating teachers about cybersecurity so they can educate their students, who can then go on to use those best practices in their careers.
Where are you to likely gain insights from security experts on how SASE can help you achieve better visibility into IT systems, secure your unmanaged applications and devices and consolidate your investments as you move to a remote workforce environment? The answer is SASE Day.
Many security practitioners take a check-box approach to cybersecurity, which prevents them from seeing the whole system. John Remo of Warner Music Group discusses how to break out of this pattern and use critical and abstract thinking to examine the deeper workings of the system.
By baselining cyber maturity, one can create an organization's risk profile - and that is the key to being able to build a road map for prioritizing and addressing business risk. ISACA's Brian Fletcher shares insights on establishing the maturity goals for one's unique organization.
Cybersecurity has the board's attention these days - the daily headlines assure that. But how does a security leader keep that attention and also win over other key stakeholders in the enterprise? Kelly Hood shares guidance rooted in ISACA's CMMI Cybermaturity Platform.
People think cloud is a silver bullet, but it’s not. It's not even copper. And people think cloud it easy and someone else’s problem. But it's not. The cloud is nothing more than a highly resilient, outsourced data center with a lot of bells and whistles.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.in, you agree to our use of cookies.