informa
/

Commentary

Elizabeth Kolade on How AI Is a 'Double-Edged Sword' & the Challenge of Harmonizing Cyber and Physical Security
An analyst at the Defence Space Administration, Nigeria, Elizabeth Kolade was named in the list of 'One to watch: Securi...
September 21, 2021
An analyst at the Defence Space Administration, Nigeria, Elizabeth Kolade was named in the list of 'One to watch: Securi...
by IFSEC Global Staff, Part of the Informa Network
September 21, 2021
5 min read
Article
Why Cryptomining Malware Is a Harbinger of Future Attacks
Crypto thieves rely on users not noticing installation of their tiny payload on thousands of machines, or the CPU cycles...
September 21, 2021
Crypto thieves rely on users not noticing installation of their tiny payload on thousands of machines, or the CPU cycles...
by Ricardo Villadiego, Founder and CEO of Lumu
September 21, 2021
5 min read
Article
White House Cybersecurity Summit: A Missed Opportunity
Last month's summit with the president was missing something crucial: representation from those who deal with critical i...
September 20, 2021
Last month's summit with the president was missing something crucial: representation from those who deal with critical i...
by Nick Cappi, Cyber Vice President, Portfolio Strategy & Enablement, at Hexagon PPM
September 20, 2021
3 min read
Article
Infrastructure, Security, and the Need for Visibility
Government authorities are increasingly trying to bolster critical infrastructure security. But investments in next-gene...
September 17, 2021
Government authorities are increasingly trying to bolster critical infrastructure security. But investments in next-gene...
by Joe Slowik, Senior Manager at Gigamon
September 17, 2021
5 min read
Article
Grappling With Growth, Employee Needs, and Security Amid a Return to Offices
As organizations strive for a new version of business-as-usual, executives must prepare for challenges around infrastruc...
September 16, 2021
As organizations strive for a new version of business-as-usual, executives must prepare for challenges around infrastruc...
by Shane Buckley, President & Chief Operating Officer, Gigamon
September 16, 2021
5 min read
Article
Under Pressure: COVID-19 Forced Many Execs to Sideline Cybersecurity
CISOs are more stressed, and the fallout is increased cyber-risk. Also, budget restrictions lead to a yawning chasm betw...
September 16, 2021
CISOs are more stressed, and the fallout is increased cyber-risk. Also, budget restrictions lead to a yawning chasm betw...
by Marc Wilczek, Digital Strategist & COO of Link11
September 16, 2021
5 min read
Article
How Your Printer Is Like Swiss Cheese
Follow these best practices to avoid the security holes created by these often-overlooked, but ubiquitous, devices.
September 15, 2021
Follow these best practices to avoid the security holes created by these often-overlooked, but ubiquitous, devices.
by Chris Rouland, Co-Founder and Chief Executive Officer at Phosphorus Cybersecurity
September 15, 2021
5 min read
Article
Purchasing Managed Security Services: Strategies for Client References
There's a scarcity of customers using managed security services who are willing to talk to others about their experience...
September 15, 2021
There's a scarcity of customers using managed security services who are willing to talk to others about their experience...
by Bob Blakley, Senior Director, Global Security Services
September 15, 2021
5 min read
Article
Name That Toon: Congrats! It's a ...
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
September 14, 2021
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
by John Klossner, Cartoonist
September 14, 2021
1 min read
Article
Outlining Risks to the World's Vital Cyber-Physical Systems
The key to protecting these systems is not only to ensure the control environment is secure and protected but also to de...
September 14, 2021
The key to protecting these systems is not only to ensure the control environment is secure and protected but also to de...
by Richard Searle, Customer Solutions Director at Fortanix
September 14, 2021
5 min read
Article
Magecart: How Its Attack Techniques Evolved
Shape-shifting Magecart has shown itself to be highly adaptable in its ability to compromise third-party websites, espec...
September 14, 2021
Shape-shifting Magecart has shown itself to be highly adaptable in its ability to compromise third-party websites, espec...
by Swapnil Bhalode, CTO, Tala Security
September 14, 2021
4 min read
Article
4 Steps for Fostering Collaboration Between IT Network and Security Teams
Successful collaboration requires a four-pronged approach that considers operations and infrastructure, leverages shared...
September 13, 2021
Successful collaboration requires a four-pronged approach that considers operations and infrastructure, leverages shared...
by Tom Bienkowski, Director, Product Marketing, NETSCOUT
September 13, 2021
5 min read
Article
IAM Stakeholders: The Business Operations Point of View
As the number of identities managed by enterprise skyrockets, organizations are taking steps to better align security an...
September 10, 2021
As the number of identities managed by enterprise skyrockets, organizations are taking steps to better align security an...
by Den Jones, Senior Director of Enterprise Security, Cisco
September 10, 2021
4 min read
Article
First Initiatives for the First National Cyber Director
The US appointed Chris Inglis as the first National Cyber Director (NCD). Here are three key problems he must now addres...
September 09, 2021
The US appointed Chris Inglis as the first National Cyber Director (NCD). Here are three key problems he must now addres...
by Dr. David Brumley, CEO, ForAllSecure
September 09, 2021
5 min read
Article
In the Hybrid Future, Secure Everything Like You're Never Going Back
Security practices must change to reflect the reality that remote/hybrid work is the new norm. Here are three risk mitig...
September 09, 2021
Security practices must change to reflect the reality that remote/hybrid work is the new norm. Here are three risk mitig...
by Dotan Bar Noy, Co-Founder and CEO, Authomize
September 09, 2021
5 min read
Article