Small and midsize organizations are no less vulnerable to cyberattacks than large enterprises. Dan Smith of Zeguro outlines an approach for these organizations that fuses cybersecurity with insurance.
For a managed security service provider to deliver maximum value for customers, it needs to provide a hybrid approach that delivers not only actionable security information but also context, says Matt Peters of Expel.
Information security programs continue to rely not just on security policies, but also the controls that ensure they get enforced. Unfortunately, such controls begin degrading the moment they're put in place, sometimes rapidly, says Josh Mayfield, director of security strategy at Absolute Software.
To help ensure that their sensitive data cannot be exfiltrated, some organizations have adopted data diodes, which are hardware devices designed to provide a one-way link to stop exfiltration or block remote attackers, says Mike Timan of Owl Cyber Defense.
The faces of digital fraud have changed dramatically over the past decade, and so too must our strategies for fighting it. Ricardo Villadiego of Cyxtera urges anti-fraud leaders to focus and simplify.
While mega data breaches gain the most attention, the long tail of smaller breaches is largely ignored. Monica Pal of 4iQ shares findings on recent breach trends.
Gaining a holistic view of corporate data in today's multicloud world is a challenge, says Alejandro Lavie of Flexera, who describes a path to establishing a single view.
Forget inside/outside the perimeter when mitigating risks. That's the notion behind "zero trust," which means applying risk-based controls to safeguard access, says Stephen Cox of SecureAuth.
Nearly 10 months after the beginning of enforcement of the EU's GDPR privacy regulation, organizations around the world are still learning plenty of compliance lessons - including how to locate all personal data so it can be protected, according to regulatory experts on a panel at RSA Conference 2019.
Autonomous vehicles are coming, but can we trust them? Summer Craze Fowler of Argo AI explains how "prosilience" is key to the future of self-driving cars and IoT.
How can enterprises couple automated processes with human intelligence to improve threat detection? Brian NeSmith of Arctic Wolf Networks shares insights.
Every security leader wants visibility into the potential attack surface. But that surface is changing in vast new ways, owing to the cloud and connected devices. Mario Vuksan of ReversingLabs defines what visibility truly means today.
Many breached businesses lack the foundational controls that would have helped to prevent a data breach, says Piero DePaoli, senior director of security and risk at ServiceNow.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.co.uk, you agree to our use of cookies.