Manish Dave of LafargeHolcim has been part of the manufacturing industry all his professional life. He heads the IT security and internal controls for the APAC region and aims to have a false positive rate of zero.
Thycotic and Centrify recently merged to create a powerful new player in the privileged access management space. Art Gilliland, CEO of the new ThycoticCentrify, discusses this combined entity and the role it can play for enterprises small and large in ensuring cloud identity security.
As organizations prepare for the post-pandemic era, endpoint protection will be key when the hybrid workforce returns to offices part time. Joakim Lialias of Cisco discusses how the company's SecureX platform can help meet those security needs.
As more organizations move to the cloud, expect attackers to follow. Accordingly, what are best practices for organizations to ensure their cloud security journey is a smooth and safe one? Sujeet Bambawale, CISO of 7-Eleven, and Sysdig's Knox Anderson share their insights.
As technical director of the Attack Investigations Team at Symantec, a division of Broadcom, Eric Chien has access to intelligence and telemetry on the latest attack trends. He shares insights on supply chain attacks and more - and discusses how defenders can raise their game in response.
How can endpoint security tools help in combating attackers who enter organizations by such stealthy means as "living off the land" attacks? In this Tech Spotlight, Adam Licata of Symantec, a division of Broadcom, discusses the new endpoint security challenges for cybersecurity leaders.
The range of digital identities has evolved into four distinct categories. What role can automation play in managing them? Jason Soroko addresses these and other trends, including the future of passwordless authentication.
Dr. Victoria Baines, a visiting research fellow at Oxford University in the U.K., is acclaimed as one of the country’s most influential women in cybersecurity. In this video interview, she describes potential future cyberthreats as criminals adapt to the changing cybersecurity landscape.
The surge of cyberattacks on the healthcare sector in the midst of the COVID-19 pandemic has accentuated many critical cybersecurity challenges that must be urgently addressed, says Joshua Corman of the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency.
He is known for his regular reports for Reuters, as well as for his books, including the latest: "Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World." Joseph Menn opens up on the biggest stories of the year and the lessons that must be learned.
It's a young practice but, globally, cyber insurance is starting to exert its influence with some of the largest enterprises - and in some of the most notable cyberattacks. John Pescatore of SANS Institute discusses questions that cybersecurity leaders need to ask before acquiring new policies.
In the past six months alone, we've seen the SolarWinds attack, the Microsoft Exchange Server exploits and the Colonial Pipeline ransomware strike. The threats are more imminent than ever. But Philip Reitinger of the Global Cyber Alliance believes strongly: We created this mess, and we can fix it.
If anyone ever doubted the importance of thinking strategically about cybersecurity, laying the groundwork for expected future requirements, then the coronavirus pandemic will have made that clear, says Kerissa Varma, group CISO of Old Mutual Ltd., who offers lessons learned for being "truly resilient."
As a retired Air Force general and the former federal CISO of the United States, Gregory Touhill is well-versed in critical infrastructure protection and resiliency. Now, as the new director of CMU SEI's CERT division, he has the opportunity to help foster new levels of education and collaboration.
The COVID-19 pandemic has been referred to as a "great equalizer," and in many ways it is - until it isn't. Forrester analyst Allie Mellen, who has studied regional impacts of COVID-19, shares surprising findings from her research.