CISO Marcin Szczepanik recalls when his team's budget was cut dramatically after the onset of the pandemic. He wanted to invest in the latest state-of-the-art tools but prioritized his costs and focused on email security - a move that improved the company's level of cyber maturity.
In the latest "Proof of Concept," VP and CISO Nicole Darden Ford shares findings from Rockwell Automation's new survey report on cybersecurity preparedness in critical infrastructure, OT security gaps, the state of critical infrastructure, and insights into preparedness and best practices.
A recent survey sponsored by Rockwell Automation finds that critical infrastructure organizations miss basic protections for operational technology, with 80% failing to conduct frequent asset inventory audits, 63% lacking real-time threat monitoring and 42% needing effective patch management.
In today's dynamic threat environment, security teams must adopt a risk-based approach, prioritizing the most important areas of their organization. They also should not be afraid to seek outside help. Murtaza Hafizji of Bugcrowd discusses the merits of crowdsourced security.
CDNs that don’t provide the real-time observability, baked-in security, and programmatic control needed to deliver the dynamic experiences today’s users demand.
Developer empowerment is essential for creating innovative digital experiences that help increase customer lifetime value, improve conversion rates,...
HelpSystems acquired Dutch red-teaming startup Outflank to help critical infrastructure firms more effectively prepare for cyberattacks. The buying of Outflank will provide clients with a broader range of red-teaming software and services thanks to Outflank's tight integration with Cobalt Strike.
Tenable wants to help the cybersecurity industry move away from traditional vulnerability management focused on giving customers a list of vulnerabilities. Instead, CEO Amit Yoran wants to help customers understand their exposure and how they can effectively manage and reduce risk.
Cyberspace is a battlefield with no physical or geographic boundaries. During wartime, targets on land, sea, air and space are vulnerable to cyberthreats and opportunities, and nations face many uncertainties about when and how to respond to attacks, says BAE Systems' Miriam Howe.
Cybersecurity is at a critical inflection point. The risk landscape has grown much more complex since ThoughtLab conducted its first cybersecurity study in 2018. Cybersecurity initiatives are not keeping pace with digital transformation, and budgets are not growing as fast as the cyber risks organizations face....
Fortinet’s FortiGuard Labs released the latest Global Threat Landscape Report - a view of events observed during the first half of 2022. Learn how actors target vulnerabilities, build malicious infrastructure and exploit their targets. The report also covers threat trends affecting IT and OT.
A well-managed multi-cloud strategy "is a sensible approach" because it allows organizations to move different workloads between providers, but it gets a "bit more complicated when you start thinking about workload portability," says Lee Newcombe, security director, Capgemini U.K.
In today's distributed environment, new threat vectors and vulnerabilities emerge daily. For organizations, agility will be the most important attribute as organizations aim to manage, secure and protect millions of assets while staying one step ahead of cybercriminals.
But the reality is that managing risk and...
Cybersecurity's top challenge today is managing risk while keeping up with evolving compliance standards.
Visibility and control of all connected devices, instruments and machines across a distributed landscape, while being agile enough to complete impromptu audits are the type of skills that security teams need...
OneTrust has put nearly $1 billion in investment to good use, helping companies address data governance, security assurance, third-party risk and more, Chief Strategy Officer Blake Brannon says. OneTrust has taken on challenges such as monitoring the ethical use of data and verifying compliance.
Building a strong business case for centralized secrets management requires you to explain the risks of not using such a solution, as well as define the benefits that a solution like this can bring to your organization.
In this whitepaper, you’ll learn how to explain the risks of not using a centralized secrets...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.