Mobility, connectivity and the infrastructure-less IT environment - they add new degrees of difficulty to cybersecurity. Michael Covington of Wandera shares strategies for securing this modern workplace.
Do CISOs need to have deep technical proficiency? Many information security professionals will say: "Of course." Ask them which skills rank highest, however, and you'll hear words such as "communication" and "building trust," says Thom Langford, director of (TL)2 Security.
No advanced hacking skills required: The burgeoning cybercrime-as-a-service economy continues to make it easy for aspiring cybercriminals to procure highly automated, easy-to-use and effective attack tools to fuel illicit profits, says Liv Rowley, a threat intelligence analyst at Blueliv.
Russia, China, North Korea, Iran - the major nation-state actors are well known to cybersecurity leaders. But how do their motivations and tactics differ? Sanjay Virmani of San Francisco's FBI office shares insight on the nation-state threat.
For the past year-plus, RSA and ISMG have teamed up for a series of North American cybersecurity roundtables dedicated to digital risk management. RSA's Ben Smith shares highlights of discussions about third-party risk, privacy and multi-cloud transformation.
Elvis Chan is one of the FBI's foremost experts on election cybersecurity. And as the US marches toward the November presidential election, he is laser-focused on protecting the vote from foreign influence.
Joseph Krull, an analyst with Aite Group recommends that vendors at RSA Conference should focus on how they integrate with the life of a CISO, rather than fixing point solutions.
Steve Katz, the world's first CISO, who cut his teeth at Citi and Merrill Lynch, stays current with emerging tech and business trends, and he has advice to share with the next generation of cybersecurity leaders.
Deception technology has moved from being an emerging technology to a more mainstream security control, say Tony Cole, and Carolyn Crandall of Attivo Networks.
It's relatively easy to list an enterprise's cybersecurity priorities for 2020. But who owns them? What are the hurdles to completing these projects? These can be tougher questions to answer, says Ellen Sundra of Forescout.
A key disconnect exists between awareness of financial services fraud schemes and mitigation, according to the latest "Faces of Fraud" survey sponsored by Appgate. Mike Lopez, vice president at the firm, describes some key findings.
Remote workers, connected devices, cloud services and infrastructure - these are the elements of the new workplace. Now, how do you secure it? That's the challenge discussed by David Wagner, CEO of Zix.
Out with the old SOC, in with the new. Respond Software CEO Mike Armistead describes the elements of the modern SOC and how to re-think security monitoring and incident response.
What is the state of cybersecurity in the energy sector, and what are some of the myths and realities about its top threats? Sean Plankey of the US Department of Energy addresses these questions.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.