The big companies make the big headlines, but the midsized entities are really the growing attack targets, says Dick Williams, CEO of Webroot. In this video interview, he discusses how new tools and services are serving this expanding market.
Threat response is a lot like physical fitness. Enterprises know what they need to do - they often just opt not to do it. RSA's Rashmi Knowles offers advice for how to move from threat prevention to response.
More cybercriminals are adapting their attack techniques, using compromised credentials linked to privileged accounts to invade networks and systems, according to researchers at Dell SecureWorks, who describe an open source solution that can help mitigate the threat.
As a vice president at IBM Security, Caleb Barlow has been a leader in the company's strategic acquisitions. What does he look for in a potential venture, and how is IBM Security taking shape to respond to the latest threats? Find out in this video interview.
Organizations can apply user behavioral analytics - the practice of reacting to how people behave in the information security realm - to better spot and block data breaches, says Fortscale's Kurt Stammberger.
Unlike other security and breach reports, Verizon's Data Breach Digest is a collection of data breach investigation case studies from around the world. Verizon's Ashish Thapar elaborates on findings from this digest.
Virginia Gov. Terry McAuliffe has a message for state leaders across the nation: Cybersecurity has to be a top item on their policy platforms. And, by the way, he very much intends to make Virginia the cyber capital of the United States.
Apple's standoff with the U.S. government is creating a healthy debate about whether federal investigators, under certain circumstances, should have the right to circumvent the security functions of smartphones and other devices, says cybersecurity attorney Chris Pierson.
What are some of the challenges practitioners will face as they attempt to look at emerging technologies, including CASB? How effective is the MSSP paradigm in addressing the skills gap? Expert security practitioner Manish Dave shares insights.
After years of being kept in the background, privacy has taken center stage in security discussions. In this video interview, Michelle Dennedy, chief privacy officer at Cisco, discusses the impact of new regulations and the issue of encryption backdoors.
Phil Reitinger, president of the Global Cyber Alliance, wants to make one thing clear: This new group is not a coalition of the willing; it's a coalition of the angry. How, then, does the alliance plan to channel its powerful energy? Find out in this video interview.
A year after retiring as chair of RSA, Art Coviello returns to the RSA Conference and, in this video interview, offers candid thoughts on the state of the industry, the global threats that concern him most and the significance of the legal struggle between Apple and the FBI.
Security organizations increasingly are hampered by the complexity of managing so many disparate controls. What they need, Fortinet's John Maddison says in this video interview, is an integrated platform that can enable a more strategic approach to cybersecurity.
Yes, security leaders need greater visibility into their systems and the internal/external threats. But they also need to improve how they share information from this view, says Gautam Aggarwal of Bay Dynamics in this video interview.
Behind many of the biggest breaches is a third-party intrusion. And yet far too few organizations have an effective third-party risk management program in place, says Norman Menz III, co-founder and CTO of Prevalent, in this video interview. How must they address this gap?