While mega data breaches gain the most attention, the long tail of smaller breaches is largely ignored. Monica Pal of 4iQ shares findings on recent breach trends.
Gaining a holistic view of corporate data in today's multicloud world is a challenge, says Alejandro Lavie of Flexera, who describes a path to establishing a single view.
Forget inside/outside the perimeter when mitigating risks. That's the notion behind "zero trust," which means applying risk-based controls to safeguard access, says Stephen Cox of SecureAuth.
Nearly 10 months after the beginning of enforcement of the EU's GDPR privacy regulation, organizations around the world are still learning plenty of compliance lessons - including how to locate all personal data so it can be protected, according to regulatory experts on a panel at RSA Conference 2019.
Autonomous vehicles are coming, but can we trust them? Summer Craze Fowler of Argo AI explains how "prosilience" is key to the future of self-driving cars and IoT.
How can enterprises couple automated processes with human intelligence to improve threat detection? Brian NeSmith of Arctic Wolf Networks shares insights.
Every security leader wants visibility into the potential attack surface. But that surface is changing in vast new ways, owing to the cloud and connected devices. Mario Vuksan of ReversingLabs defines what visibility truly means today.
Many breached businesses lack the foundational controls that would have helped to prevent a data breach, says Piero DePaoli, senior director of security and risk at ServiceNow.
Information technology and operational technology are converging as industrial devices become connected. Damiano Bolzoni of Forescout discusses the emerging cyber implications.
The network is much more than just the sum of its endpoints, and the imperative to secure everything has led to detection and response emerging as a top priority for many organizations, says Chris Morales of Vectra Networks.
In a keynote address at the RSA Conference 2019, RSA President Rohit Ghai encouraged attendees to work in the coming years to "implement a security program with machines and humans working together. Humans asking questions; machines hunting answers."
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.eu, you agree to our use of cookies.