Most cybersecurity leaders know that people are their organizations’ biggest and most dynamic attack surface. So why is phishing still the threat type most likely to cause a data breach? Most training programs lack staying power and doesn’t promote lasting changes in behavior. Download this e-book to learn why...
Everyone gets phishing emails. Not everyone falls for them. Find out how vulnerable users are to today’s biggest cyber threats in our eighth annual State of the Phish report. This year’s report dives deep into today’s threats—and how prepared users are to face them. Get a wealth of data, insight and advice...
At a time when applications are more business-critical than ever - and visibility is more challenging to achieve - we need to discuss new strategies and tools for maximizing application intelligence. Sujay Pathakji of Axiom Telecom and Srudi Dineshan of Gigamon share insights.
Zero Trust Network Access (ZTNA) is one of the biggest concepts in cybersecurity, and for good reason – it’s one of the most secure and reliable ways to protect critical assets, like systems, networks, applications, and data, from bad actors or inappropriate user access.
Use this Zero Trust checklist as a...
Harold Moss, the CEO of Tautuk, has a background in building products, but many in cybersecurity do not come from a product background. In this interview with Brian Barnier, he discusses the importance of context, listening and collaboration for teams to understand creative and critical thinking.
Eighty percent of survey respondents say they either are well on the way or getting started toward becoming a "smart manufacturing company." Cloud migration, business resiliency and securing OT environments are among their priorities. Del Rodillas of Palo Alto Networks analyzes the survey results.
Fifty-three percent of survey respondents say cyberthreats became fiercer during COVID-19, and 17% say the pandemic disrupted their data security initiatives. These are among findings of a new survey sponsored by HelpSystems. Cary Hudgins analyzes the results and discusses how to put them to work.
To survive in today’s cyber threat landscape, security teams need the right resources paired with the appropriate strategy. Many organizations turn to managed security services (MSS) and managed detection and response (MDR) services, but many of the providers aren’t delivering the outcomes that clients had been...
Sri Lanka-based Sujit Christy, group CISO at John Keells Holdings PLC, says his passion is empowering security practitioners with the right skills and knowledge and ensuring they speak the right language. He discusses cybersecurity adoption and enablement.
In Q4 2021, Kroll observed a 356% increase in common vulnerabilities and exposures
(CVEs) or zero-day vulnerabilities being exploited for initial access when compared to
With 2021 being a record year for vulnerabilities, these findings underscore the risk to organizations in the wake of...
Many security practitioners take a check-box approach to cybersecurity, which prevents them from seeing the whole system. John Remo of Warner Music Group discusses how to break out of this pattern and use critical and abstract thinking to examine the deeper workings of the system.
By baselining cyber maturity, one can create an organization's risk profile - and that is the key to being able to build a road map for prioritizing and addressing business risk. ISACA's Brian Fletcher shares insights on establishing the maturity goals for one's unique organization.
Cybersecurity has the board's attention these days - the daily headlines assure that. But how does a security leader keep that attention and also win over other key stakeholders in the enterprise? Kelly Hood shares guidance rooted in ISACA's CMMI Cybermaturity Platform.