The increase in attack vectors and new threats has prompted companies to invest heavily in cybersecurity tools. But CISOs struggle with managing siloed products that do not integrate with each other. Consolidation of security architecture is a priority for CISOs, said Check Point's Itai Greenberg.
Skilled attackers...
Automated XDR platforms are increasingly sought after as organizations grapple with tool sprawl and the complexity of their security stack. But is there a risk of XDR platforms becoming a single point of failure? Microsoft Senior Director Scott Woodgate emphasized building "resiliency" for XDR.
Microsoft's XDR...
The relationship between a customer and a brand is personal. Customers want to trust a brand, and that includes trusting it with protecting their digital identity.
The 2023 Telesign Trust Index reveals the critical role of trust in the digital economy. The report illustrates that customers are not only afraid of...
As the world of customer-business interaction continues to shift toward mobile apps, the challenge of keeping these apps secure is becoming more and more critical. With cyberthreats lurking around every corner, businesses that rely on mobile apps need to ask themselves a fundamental question: What's the best way to...
The state of the software supply chain in 2023 continues to be "unacceptable," said Brian Fox, co-founder and CTO at Sonatype. Sounding alarm bells, Fox cited a Sonatype report that said organizations are using known vulnerable components in their applications 96% of the time and known Log4j vulnerabilities nearly 30%...
As the largest media company at RSA Conference 2023, ISMG conducted more than 160 individual interviews with CEOs, CISOs, government leaders, investors, researchers and attorneys. This compendium covers every facet of cybersecurity, from the latest technology solutions to emerging trends.
Customers want to trust a brand, and that includes trusting it with protecting their digital identity. Joe Burton, Telesign CEO, advised that customers should be part of the "security journey." Explaining why you're asking for information to verify their identities "turns friction from annoying to reassuring."
Attacks like Kaseya and SolarWinds have highlighted the supply chain risks and demonstrated how securing the supply chain can no longer just be considered a compliance function. It has evolved into a risk management function, said Fred Kneip, chief executive officer at CyberGRX.
The cybersecurity industry is undergoing profound and rapid change, said John Chambers, the visionary former CEO of Cisco Systems who has turned venture capitalist and predicts the market will soon demand an outcome-focused architecture - not products - to underpin next-generation tech.
How much regulation is too much, and how much is too little? Increased cyber regulation, especially in areas of critical infrastructure, is necessary, as outages in the space have the potential to affect many Americans, said Ilona Cohen, chief legal and policy officer at HackerOne.
Historically, U.S. regulators have been slow to set controls on critical infrastructure because of the technical complexity of systems in that sector, but that is changing thanks to the U.S. national cybersecurity strategy, said Glenn Gerstell of the Center for Strategic and International Studies.
What are the challenges facing the U.S. financial sector as it continues its enthusiastic embrace of cloud-based technology? Department of the Treasury Deputy Assistant Secretary Todd Conklin said the agency has been "doing the best we can to secure cloud" as firms increasingly adopt it.
As Bugcrowd helps OpenAI keep pace with the inevitable cybersecurity risks amid the massive popularity of its applications, the bug bounty firm's CEO discusses the unique elements of finding vulnerabilities in OpenAI, its impact and the journey so far.
The use of cloud by financial services firms has risen from 91% to 98%, and multi-cloud for critical operations has risen dramatically, triggering greater risk and regulatory scrutiny, said Troy Leach, chief strategy officer at the Cloud Security Alliance, citing a new survey.
The trend of bring your own device has boosted global businesses, but as new smartphones, tablets and portable storage devices emerge, the challenge of securing these devices intensifies. With organizations increasingly adopting BYOD, the question remains: How can we secure these devices?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.