Security organizations increasingly are hampered by the complexity of managing so many disparate controls. What they need, Fortinet's John Maddison says in this video interview, is an integrated platform that can enable a more strategic approach to cybersecurity.
Yes, security leaders need greater visibility into their systems and the internal/external threats. But they also need to improve how they share information from this view, says Gautam Aggarwal of Bay Dynamics in this video interview.
Financial services firms and healthcare institutions have been at the forefront of adopting encrypted email, simply because so much vital and sensitive information today naturally flows via email, Dave Wagner, CEO of ZixCorp, says in this video interview.
Behind many of the biggest breaches is a third-party intrusion. And yet far too few organizations have an effective third-party risk management program in place, says Norman Menz III, co-founder and CTO of Prevalent, in this video interview. How must they address this gap?
Keeping up with today's security and regulatory demands requires a centralized and integrated security platform, necessitating a move away from single-point security products and solutions, Dr. Richard Ford of enterprise security firm Forcepoint says in this video interview.
The ISMG team concluded its video interviews at the RSA Conference on Wednesday, March 2. And in many ways, they saved some of the best for last. Editors Tom Field, Tracy Kitten and Mathew Schwartz discuss highlights of their conversations.
IT security is amidst a seismic transformation, and the evolution requires a particular set of technologies and skills. In this interview, Greg Bell of KPMG offers insights on how security leaders can prepare for change.
Increasingly, regulatory agencies are pressuring organizations to assess and attest to the cybersecurity of their business partners. In this video interview, Jay Jacobs of Bitsight Technologies discusses strategies for third-party management.
As millennials come to represent more than 50 percent of the population, that dynamic changes global payments - and fraud. In this video interview, David Sylvester of Easy Solutions discusses new strategies to help protect users from their own behavior.
The complexity of cybersecurity creates new headaches for organizations, says John Peterson of Comodo. The cure? Specialized threat analysis and protection. In this video interview, Peterson discusses how to implement this new model.
It has become accepted in many security corners that "breach is inevitable." But Rohyt Belani, CEO of PhishMe, rejects that notion. In this video, learn how he believes organizations should be arming their employees to help fight back against attackers.
Fraud and security teams have been converging for years, and now they have some common technology tools that can meet their unique and shared needs. How best can they manage convergence? Joe Nocera of PricewaterhouseCoopers offers insights in this video interview.
After a long career in the Secret Service, Steven Bullitt has joined Solutionary as its new vice president of cyber forensics and investigations. In this video interview, he explains the new perspective he brings to cybercrime defense and investigations.
A new report from researchers at RSA describes how cybercriminals are using social media, including Facebook, to not only network about their attacks, but also sell card data and other compromised consumer information. Daniel Cohen of RSA FraudAction describes the report in this video interview.
Just back from a trip to Israel, where she spoke with leading security researchers about such topics as the Internet of Things, cyberterrorism and banking malware, Gartner analyst Avivah Litan says 2016 will be a turning point for adoption of biometrics in identity proofing. Learn why in this video interview.