New encryption standards TLS 1.3 and DNS-over-HTTPS (DoH) will soon sweep away security controls. Security professionals must act within the next two years or they won't be able to analyze network traffic and detect cyberthreats.
Download the Forrester report —Maintain Security Visibility in the TLS 1.3 Era —...
The new ESG Economic Validation 2020 report shows how to save money, find hidden threats faster, automate security investigations and optimize security workflows and tracking.
CIO. Consulting CISO. Mentor. Activist on behalf of recruiting more women for cybersecurity and leadership. Jo Stewart-Rattray has filled many roles, and she has great insights to share with those who are starting or changing careers.
Less than a year ago, Ariel Weintraub was dabbling in data science as head of security operations and engineering at MassMutual, working under CISO Jim Routh. Now she’s replaced Routh as the new head of enterprise cybersecurity - and she welcomes the challenge.
It can no longer be a topic of debate. If you have enterprise assets connected to the Internet, you will get breached. It is only just a matter of when. Every organization, especially in today’s work-from-home economy must have a documented incident response plan and sets of playbooks that form the incident response...
The U.K. Cyber Security Council, a new self-regulatory body for the cybersecurity education and skills sector, is designed to help "close the skills gap," says Claudia Natanson, board chair.
Deep-seated cultural issues are responsible for workplace inequality for women in cybersecurity, and recognizing unconscious biases is very important in remedying this issue, says Clare Johnson, partnerships and outreach manager at the University of South Wales in the U.K.
Real-world penetration and security assessments have
uncovered the most common risks to mainframe
security. What are they?
Download this infographic for a brief, yet detailed synopsis.
Billions of documents are exiting the enterprise’s perimeter through unsecured databases – exposing confidential and sensitive data. How many of these data leaks belong to your organization?
David Sygula, CybelAngel Senior Cybersecurity Analyst and Author shares 2020 research, which exposes the source and...
Modern IT teams feel pressure from all directions. They must maintain compliance with data privacy regulations, track and secure sensitive data across endpoints and manage an ever-increasing number of assets, all while enabling business growth. Balancing these priorities often causes significant challenges for many...
In order to assess technology spending priorities over the next 12-18 months, ESG recently surveyed 664 IT and business professionals representing midmarket (100 to 999 employees) and enterprise-class (1,000 employees or more) organizations in North America and Western Europe. All respondents were personally...
Digital transformation is a way of life in today’s business world. It touches all corners of the enterprise in ways that were once unimaginable. CIO and IT executives at companies of all sizes and in all industries are quickly coming to realize that most legacy tools and processes are, at best, inefficient and are...
Penetration testing. Bleeding-edge technology solutions. A huge budget. Are these enterprise cybersecurity essentials … or could you ignore them and still have a comprehensive and effective cyber defense?
We all know that cybersecurity is an increasingly important part of our business life, and that it requires...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.eu, you agree to our use of cookies.