As technology progresses, breaches progress and with hybrid work environments as the new norm, this means more devices are outside of the corporate network.
The question organizations must ask is how can users securely perform their work with a set of least privileges while preventing business disruption?
The...
Forescout will have its fourth CEO since September 2020. It tapped former Malwarebytes COO and MobileIron CEO Barry Mainz to take over as its top leader. The company brought in Mainz to replace Wael Mohamed, who started as Forescout's CEO in March 2021 and announced his departure in October 2022.
The tech giants in the MAMAA club have a disproportionate amount of data. It helps them easily identify customers - even when signing in on new devices - reduces the friction of identity challenges such as multifactor authentication, and helps them spot fraud. Unfortunately, most of the rest of the world sits under...
Ordr has tapped Jim Hyman, a former COO and Zscaler's first non-engineering hire, to fill the CEO job. Hyman is tasked with deepening the connected device vendor's bond with security stalwarts like Cisco and CrowdStrike and moving beyond opportunistic partnerships in favor of a concerted strategy.
The progress in modern medical care is remarkable. Increasing development of
Internet of Things (IoT) devices for the medical industry is a key factor in that
progress. In recent years, pacemakers, defibrillators, and other medical device
implants have gotten smaller and smarter.
While medical devices bring a host...
As cybercriminals continually evolve their tactics to gain access to systems and data, organizations must navigate the risks of increased vulnerabilities and stay vigilant against emerging cyber threats. It is no longer enough to think of cybersecurity as segmented pieces of a strategy.
In this webinar, we will...
This whitepaper addresses questions raised by security leaders that want to better understand their organization’s development environments, the risks development tools expose and the best practices and approaches for securing them, across the software supply chain. Three focus areas are examined which address how...
In this era of Digital Transformation as our reliance on digital systems and technology increases, we see that it’s only cyberattacks that have broken away from this dependency and are exceeding in terms of both scale and severity.
Organizations, thought leaders and C-Suite officials are struggling to keep up...
Four ISMG editors discuss important cybersecurity issues, including the hot topics at ISMG roundtable discussions - such as challenges around software supply chain security, highlights from ISMG's upcoming Healthcare Summit, and how some cybersecurity vendors are creating their own venture funds.
Ransomware-as-a-service, supply chain attacks and the Russia/Ukraine war - they all are factors behind the growing need for digital executive protection outside the traditional workplace. Chris Pierson of BlackCloak shares new research and insights.
Managing risks begins with measuring risks. But how do you measure risks accurately? How do you share your findings in a meaningful way to both technical and non-technical audiences?
When measuring risk, the focus should be on what’s meaningful to your audience. And for the most important decisions about...
Tenable has agreed to purchase startup Bit Discovery for $44.5 million to help companies discover, attribute and monitor assets on the internet. The deal will allow Tenable to identify vulnerable internet-facing assets that could be attacked.
Gartner projects that in 2022, Endpoint Protection Platforms will take the #1 spot in information security software spending, reaching $15.9B and will continue increasing gap with the second largest segment throughout 2026 reaching $29.2B.1
Will this increase in spend result in a decrease in successful endpoint...
Every connected device is now considered a part of the Extended Internet of Things (XIoT). When securing XIoT devices that connect to networks, it can be hard to account for all the nuances required to secure them. What simplifies the process of delivering contextually aware threat detection and recommendations is an...
Older consumers are considered a more vulnerable population. They are the best kind of customers, and cybercriminals know that. They are known for having better credit and more funds, tend to be more trusting, and lack familiarity with new digital technologies. Fortunately, there is a way to help financial...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.