informa

Commentary

Looking Beyond Biden's Binding Security Directive
Implementing these and other security procedures will greatly improve the security posture of the United States and its private partners.
January 21, 2022
Implementing these and other security procedures will greatly improve the security posture of the United States and its private partners.
by Mariano Nunez, CEO & Co-Founder, Onapsis
January 21, 2022
5 min read
Article
Enterprises Are Sailing Into a Perfect Storm of Cloud Risk
Policy as code and other techniques can help enterprises steer clear of the dangers that have befallen otherwise sophisticated cloud customers.
January 20, 2022
Policy as code and other techniques can help enterprises steer clear of the dangers that have befallen otherwise sophisticated cloud customers.
by Josh Stella, Founding CEO, Fugue
January 20, 2022
5 min read
Article
4 Ways to Develop Your Team's Cyber Skills
Organizations need to invest in professional development — and then actually make time for it.
January 20, 2022
Organizations need to invest in professional development — and then actually make time for it.
by Jeff Orloff, Vice President of Products and Technical Services, RangeForce
January 20, 2022
4 min read
Article
Cloud Adoption Widens the Cybersecurity Skills Gap
No matter what cloud services you employ, you are still responsible for protecting the security of your data.
January 19, 2022
No matter what cloud services you employ, you are still responsible for protecting the security of your data.
by A.N. Ananth, President, Netsurion
January 19, 2022
4 min read
Article
Preparing for the Next Cybersecurity Epidemic: Deepfakes
Using blockchain, multifactor authentication, or signatures can help boost authentication security and reduce fraud.
January 19, 2022
Using blockchain, multifactor authentication, or signatures can help boost authentication security and reduce fraud.
by Elaine Lee, Principal Data Scientist, Cybergraph team, Mimecast
January 19, 2022
4 min read
Article
Name That Toon: Nowhere to Hide
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
January 18, 2022
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
by John Klossner, Cartoonist
January 18, 2022
1 min read
Article
5 Reasons Why M&A Is the Engine Driving Cybersecurity
Consistent acquisition of key technologies and talent is a proven strategy for growth.
January 18, 2022
Consistent acquisition of key technologies and talent is a proven strategy for growth.
by Gary Guseinov, CEO, RealDefense, and Senior Operating Advisor, Corbel Capital Partners
January 18, 2022
4 min read
Article
Mastering the Art of Cloud Tagging Using Data Science
Cloud tagging, the process of labeling cloud assets by certain attributes or operational values, can unlock behavioral insights to optimize and automate cyber asset management at scale.
January 17, 2022
Cloud tagging, the process of labeling cloud assets by certain attributes or operational values, can unlock behavioral insights to optimize and automate cyber asset management at scale.
by Keith Neilson, Technical Evangelist, CloudSphere
January 17, 2022
5 min read
Article
What's Next for Patch Management: Automation
The next five years will bring the widespread use of hyperautomation in patch management. Part 3 of 3.
January 14, 2022
The next five years will bring the widespread use of hyperautomation in patch management. Part 3 of 3.
by Srinivas Mukkamala, Senior Vice President, Security Products, Ivanti
January 14, 2022
5 min read
Article
How Cybercriminals Are Cashing in on the Culture of 'Yes'
The reward is always front of mind, while the potential harm of giving out a phone number doesn't immediately reveal itself.
January 13, 2022
The reward is always front of mind, while the potential harm of giving out a phone number doesn't immediately reveal itself.
by Mike Kiser, Director of Strategy and Standards, SailPoint
January 13, 2022
5 min read
Article
Redefining the CISO-CIO Relationship
While these roles have different needs, drivers, and objectives, they should complement each other rather than compete with one another.
January 13, 2022
While these roles have different needs, drivers, and objectives, they should complement each other rather than compete with one another.
by Alex Cunningham, Senior Vice President and Chief Information Security Officer, Advisor360°
January 13, 2022
4 min read
Article
Critical Infrastructure Security and a Case for Optimism in 2022
The new US infrastructure law will fund new action to improve cybersecurity across rail, public transportation, the electric grid, and manufacturing.
January 12, 2022
The new US infrastructure law will fund new action to improve cybersecurity across rail, public transportation, the electric grid, and manufacturing.
by Kurt John, Chief Cybersecurity Officer, Siemens USA
January 12, 2022
5 min read
Article
Patch Management Today: A Risk-Based Strategy to Defeat Cybercriminals
By combining risk-based vulnerability prioritization and automated patch intelligence, organizations can apply patches based on threat level. Part 2 of 3.
January 12, 2022
By combining risk-based vulnerability prioritization and automated patch intelligence, organizations can apply patches based on threat level. Part 2 of 3.
by Srinivas Mukkamala, Senior Vice President, Security Products, Ivanti
January 12, 2022
4 min read
Article
Why the Insider Threat Will Motivate Cyber and Physical Teams to Collaborate More Than Ever in 2022
It's hard to have a crystal ball in the world of security, but if one were to make a safe prediction, it's this: Organizations will need to further integrate their cybersecurity and physical security functions throughout 2022 and beyond. So argues former chief psychologist for the US Secret Service, Dr. Marisa Randazzo, who now heads up Ontic's Center of Excellence.
January 11, 2022
It's hard to have a crystal ball in the world of security, but if one were to make a safe prediction, it's this: Organizations will need to further integrate their cybersecurity and physical security functions throughout 2022 and beyond. So argues former chief psychologist for the US Secret Service, Dr. Marisa Randazzo, who now heads up Ontic's Center of Excellence.
Dr. Marisa Randazzo, Executive Director, Ontic Center of Excellence
January 11, 2022
7 min read
Article
Why Security Awareness Training Should Begin in the C-Suite
It's not just the rights and privileges that CXOs have on the network. They can also set an example of what good security hygiene looks like.
January 11, 2022
It's not just the rights and privileges that CXOs have on the network. They can also set an example of what good security hygiene looks like.
by Ashley Rose, CEO and Co-Founder, Living Security
January 11, 2022
4 min read
Article