Bobby Ford of Hewlett Packard Enterprise says that too often when an organization engages with security, it happens in an ad hoc way. He describes his mission to create a Cybersecurity Center of Excellence to streamline the organization's security incident management and response processes.
The threat landscape has grown, and the airlines industry in particular has been challenged. As a result, Rob Hornbuckle, CISO of Allegiant Airlines, sees his role differently: It's beyond security and about more than just the business. Where is the role going, and how does one grow with it?
The latest edition of the ISMG Security Report features an analysis of how ransomware attackers share about their inclinations, motivations and tactics. Also featured: The rise of integrity attacks; dispelling vaccine myths.
Everywhere you look, “passwordless” is the hot topic in cybersecurity and every enterprise’s ultimate security goal.
…but what does it really mean? You might hear a lot about the journey to passwordless, but this guide will dive into why it is so important and how to get there in the most simple way.
A compromised identity and its associated shared accounts are the single most
effective attack vector for a threat actor to compromise an entire multicloud
Download this whitepaper to learn how to protect your entire cloud environment, including:
Restricting the privileges any user, application,...
We’ve gone from a remote workforce to “work from anywhere.” How does this create new security challenges regarding the broad and unrestricted accessing of cloud apps?
Download this executive guide from Sasi Murthy, Netskope's VP of Products and Solutions, for highlights on embracing zero trust data protection...
The world has changed over the past year, but cyberthreats never rest. According to the report, 86 percent of organizations experienced at least one successful cyberattack last year. The more you know about how your peers are handling the most serious threats, the more effectively you can secure your own...
It would seem for the foreseeable future, if you want something done, it will increasingly have to be done remotely. This is the new operating environment in which we have had to live, adapt and deliver.
This whitepaper is not intended to be an exhaustive guide to mainframe services and client requirements in the new...
Mainframes are often considered one of the most secure data
environments, but organizations are mistaken to believe that mainframes
are inherently secure. In reality, secure means “securable.”
Download this Forrester research report, which includes data on:
Current perceptions of mainframe security
Dr. Victoria Baines, a visiting research fellow at Oxford University in the U.K., is acclaimed as one of the country’s most influential women in cybersecurity. In this video interview, she describes potential future cyberthreats as criminals adapt to the changing cybersecurity landscape.
In the past six months alone, we've seen the SolarWinds attack, the Microsoft Exchange Server exploits and the Colonial Pipeline ransomware strike. The threats are more imminent than ever. But Philip Reitinger of the Global Cyber Alliance believes strongly: We created this mess, and we can fix it.
If anyone ever doubted the importance of thinking strategically about cybersecurity, laying the groundwork for expected future requirements, then the coronavirus pandemic will have made that clear, says Kerissa Varma, group CISO of Old Mutual Ltd., who offers lessons learned for being "truly resilient."
The COVID-19 pandemic has been referred to as a "great equalizer," and in many ways it is - until it isn't. Forrester analyst Allie Mellen, who has studied regional impacts of COVID-19, shares surprising findings from her research.
From identity and access management to cloud migration and connected devices, retired RSA CEO Art Coviello looks beyond the pandemic and says, "It's going to be a Roaring '20s for technology." But he also foresees a potentially calamitous decade for security.