informa

Sponsored Article

4 Steps Toward Knowing Your Exploitable Attack Surface
Actionable steps you can take today to identify the true risk your organization faces — learn how to separate the exploitable vulnerabilities from the rest.
January 25, 2022
Actionable steps you can take today to identify the true risk your organization faces — learn how to separate the exploitable vulnerabilities from the rest.
Omer Zucker, Product Team Lead, Pentera
January 25, 2022
5 min read
Article
Ransomware Operators Are Feeling the Heat
Ransomware has maintained its dominance the past few years; however, increased law enforcement attention may result in changes to how it looks in the future.
January 24, 2022
Ransomware has maintained its dominance the past few years; however, increased law enforcement attention may result in changes to how it looks in the future.
Dan Alexander, Head of Threat Intelligence, BAE Systems Applied Intelligence
January 24, 2022
5 min read
Article
Convergence Zone: CNAPP Aids in Integrated Cloud-Native Security
Cloud Native Application Protection Platforms (CNAPP) allow organizations to secure cloud-native applications across the full application life cycle.
January 06, 2022
Cloud Native Application Protection Platforms (CNAPP) allow organizations to secure cloud-native applications across the full application life cycle.
By Ankur Shah, Senior Vice President of Products, Prisma Cloud, Palo Alto Networks
January 06, 2022
5 min read
Article
Why We Need "Developer-First" Application Security
The way to improve the security of the modern software development life cycle and reduce the number of application-based breaches is to re-center app security around the needs of developers.
December 15, 2021
The way to improve the security of the modern software development life cycle and reduce the number of application-based breaches is to re-center app security around the needs of developers.
Jeff Williams, Co-Founder & Chief Technology Officer, Contrast Security
December 15, 2021
5 min read
Article
5 Ways GRC & Security Can Partner to Reduce Insider Risk
In 2022, data governance, risk, and compliance (GRC) and security need to partner to implement a modern approach to data protection: insider risk management.
December 07, 2021
In 2022, data governance, risk, and compliance (GRC) and security need to partner to implement a modern approach to data protection: insider risk management.
Mark Wojtasiak, VP, Portfolio Marketing, Code42
December 07, 2021
5 min read
Article
Develop 'Foursight' — Keep Your Post-COVID Transformation on Track
For IT organizations, the global health crisis didn't make meeting current and future compliance obligations easier. Here are four content protection focus areas that help the enterprise maintain compliance today, and stay on course for future digital transformation.
December 02, 2021
For IT organizations, the global health crisis didn't make meeting current and future compliance obligations easier. Here are four content protection focus areas that help the enterprise maintain compliance today, and stay on course for future digital transformation.
Christina Wood, Head of Global Marketing for the Information Management & Governance (IM&G) Product Group at Micro Focus
December 02, 2021
5 min read
Article
To Beat Ransomware, Apply Zero Trust to Servers Too
The path out of the ransomware crisis is full inspection and protection of all traffic flows. That means zero trust everywhere — even between servers.
November 19, 2021
The path out of the ransomware crisis is full inspection and protection of all traffic flows. That means zero trust everywhere — even between servers.
Robert Blumofe, Executive Vice President and Chief Technology Officer, Akamai
November 19, 2021
5 min read
Article
Insider IP Theft Is Surging — and Most Can't Stop It
The Great Resignation is upon us, and insider IP theft is surging as a result. But it is a solvable problem.
November 11, 2021
The Great Resignation is upon us, and insider IP theft is surging as a result. But it is a solvable problem.
Mark Wojtasiak, VP, Portfolio Marketing, Code42
November 11, 2021
5 min read
Article
The State of the CISO
Dark Reading survey shows security officer influence is on the rise.
November 09, 2021
Dark Reading survey shows security officer influence is on the rise.
Michael Eisenberg, Vice President – Strategy, Privacy, Risk – Coalfire
November 09, 2021
5 min read
Article
Finding the Right Approach to Cloud Security Posture Management (CSPM)
Cloud security is maturing — it has to. New strategies are surfacing to respond to new problems. Dr. Mike Lloyd, RedSeal's CTO, reviews one of the latest: CSPM.
October 29, 2021
Cloud security is maturing — it has to. New strategies are surfacing to respond to new problems. Dr. Mike Lloyd, RedSeal's CTO, reviews one of the latest: CSPM.
Dr. Mike Lloyd, CTO of RedSeal
October 29, 2021
5 min read
Article
What Does Better Insider Risk Management Look Like?
Conventional data security tools do not address insider risk — a growing problem in today's remote-hybrid world. We need a better way to manage insider risk.
October 22, 2021
Conventional data security tools do not address insider risk — a growing problem in today's remote-hybrid world. We need a better way to manage insider risk.
Mark Wojtasiak, VP, Portfolio Marketing, Code42
October 22, 2021
5 min read
Article
Are You Ready for the Privacy Laws Tsunami?
Think PCI, HIPAA, and GDPR compliance is tough? There's a tsunami of similar laws on the way. Prepare your business for success with privacy by design.
October 13, 2021
Think PCI, HIPAA, and GDPR compliance is tough? There's a tsunami of similar laws on the way. Prepare your business for success with privacy by design.
Anshu Sharma, Co-founder and CEO, Skyflow
October 13, 2021
5 min read
Article
How to Determine the Best Managed Cybersecurity Model for You
Organizations need to protect against online threats in the most cost-effective manner possible. How do they determine the best managed cybersecurity model?
October 06, 2021
Organizations need to protect against online threats in the most cost-effective manner possible. How do they determine the best managed cybersecurity model?
Dylan Owen, Associate Director for Cyber Services, Raytheon Intelligence & Space
October 06, 2021
5 min read
Article
DAST to the Future: Shifting the Modern AppSec Paradigm
NTT Application Security's Modern AppSec Framework takes a DAST-first approach to defend applications where breaches happen — in production.
September 29, 2021
NTT Application Security's Modern AppSec Framework takes a DAST-first approach to defend applications where breaches happen — in production.
Eric Rodriguez, Director of Demand Generation and Digital Marketing at NTT Application Security
September 29, 2021
5 min read
Article
A Cyber-Resilience Model for the Next Era
Digital dilemmas have driven security to the forefront of business leaders' priorities. Understanding how to provide security at the speed of change and build a cyber-resilient organization will drive competitive advantage and help organizations run and transform with ease.
September 22, 2021
Digital dilemmas have driven security to the forefront of business leaders' priorities. Understanding how to provide security at the speed of change and build a cyber-resilient organization will drive competitive advantage and help organizations run and transform with ease.
Rob Aragao, Chief Security Strategist at CyberRes, a Micro Focus line of business
September 22, 2021
5 min read
Article