Every second of downtime after a ransomware attack costs businesses in industries such as retail and e-commerce large sums of cash. Business continuity is therefore vital even before determining whether ransomed data or systems can be recovered, says VMware Security General Manager Kal De.
Arctic Wolf was one of many security companies to relocate during the COVID-19 pandemic, moving from Silicon Valley to the Minneapolis area in 2020. The move was accompanied by a push to find workers in nontraditional geographies that continues today, says Chief Product Officer Dan Schiappa.
Microsoft Azure Chief Security and Risk Officer Edna Conway says the industry is getting better at sharing information, but adds, "We don't have the protections that we need." She envisions a new model for information sharing that will be better suited for use in the next 10 years.
Former Rockwell Automation CISO Dawn Cappelli discusses the mission of the new Dragos OT-CERT - a cybersecurity resource designed to help industrial asset owners and operators build their OT cybersecurity programs, improve their security postures and reduce OT risk - and her role as its director.
SMEs recognize the need to increase their cybersecurity spend, but limited resources can make them uncertain about which tools to invest in, says Matt Aldridge, principal solutions consultant at OpenText. He explains why a comprehensive approach is key to achieving and maintaining cyber resilience.
Security leaders shouldn't ignore current geopolitical tensions, which are going to infiltrate into private sectors, says Troy Leach of the Cloud Security Alliance. And John Kindervag of ON2IT Cybersecurity says - for that reason - organizations need to stop being cheap on cybersecurity.
During the accelerated digital transformation of the past two years, enterprises have fully embraced multi-cloud environments. But security practitioners are learning that security in the cloud requires a new mindset and a unique set of skills, says Jonathan Trull, CISO of Qualys.
Organizations need to ensure the push to maximize profits doesn't jeopardize the privacy of user information. Skyflow Chief Privacy Officer Robin Andruss says businesses need to maintain guardrails around customer data in the face of massive technological change.
Many people enter the cybersecurity field with foundational skills, such as knowledge gleaned from college courses, and giving them "practical skills, to be ready go out on the job floor and be ready to do something - that takes a little bit of something extra," says ITProTV co-founder Don Pezet.
Midmarket companies face many of the same cyberthreats as enterprises but have neither the budget nor the staffing of those larger organizations. Portnox CEO Denny LeCompte is attempting to ensure that the security needs of midmarket companies are at last fully addressed.
More organizations are using attack path management to simulate how attackers will likely break into any given environment, to help IT and security teams better allocate resources and prioritize remediation efforts to optimize their defenses, says Paul Giorgi of XM Cyber.
Businesses have embraced zero trust architectures in an effort to increase their protection while reducing cost and complexity for the organization, according to iboss CEO Paul Martini. Martini says companies are turning to zero trust to more effectively protect their users, applications and data.
The "Great Resignation" over the past year has created a host of concerns around both malicious and accidental data theft, says Code42 President and CEO Joe Payne. Even though employees often aren't looking to wreak havoc on their way out, a lack of understanding can lead to serious headaches.
The COVID-19 pandemic has accelerated the migration to the cloud for many organizations, and there have also been challenges associated with securing hybrid or multi-cloud environments, according to Omdia Senior Principal Analyst Fernando Montenegro.
Crum & Forster CISO Chris Holden has helped organizations respond to many breaches over the years, and through this experience he has developed an excellent sense of who companies should call first and have on their response team if they suspect that a security incident has taken place.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.