Implementing a multi-cloud architecture across different geographies opens up unique security risks. Bill Doerrfeld recommends concrete measures to protect your business.
Technology leaders may encounter resistance from their teams regarding multi-cloud transitions. Rob Wood advises how to handle it and move forward.
Lookout Strategy Chief Aaron Cockerill drills into the company’s State of Mobile Phishing Report and says education is a key tactic to reduce the threat.
Developers need guidance from CISOs to protect corporate data stores, ensure compliance, and spot disgruntled employees, and more, analysts Chris Hughes and Paul Swider explain.
A data governance framework is critical for an organization’s cybersecurity strategy. Frank Domizio explains why.
Annual mobile phishing report from security vendor Lookout has troubling findings about volume, complexity, and impact of phishing attacks. Kieron Allen reviews the findings, and how to respond.
The latest Growth Swarm podcast covers what practitioners must do to manage their businesses and technologies in today’s volatile economy.
The latest release of cybersecurity vendor Lookout’s mobile phishing report indicates attacks are becoming more expansive — and expensive.
The rise of software-as-a-service presents new business opportunities, but also new security challenges that need to be balanced with business enablement to ensure growth and protection. This guidebook on Securing Software-as-a-Service Applications, underwritten by Lookout, provides expert insights on how to integrate SaaS securely into businesses.
Learn all the latest in retail innovation from our expert team of practitioner-analysts including how to enhance your strategies with hyperautomation.
Acceleration Economy analyst Tom Smith shares his top session picks for all three days of the upcoming Digital CIO Summit in this discussion with Aaron Back.
Data security strategy must go beyond securing a company’s data and employees to protect every data channel and counterparty. Wayne Sadin presents guidelines for managing third-party data risks.
CoSo Cloud CEO Glen Vondrick shares his thoughts on the current and future state of remote work, with an emphasis on enforcing cybersecurity for audio and video content.
Organizations aiming to be “data intelligent” must have a foundation of data governance in place that spans all facets of the business. Why? Customer dazzle which leads to revenue growth.
Security data often ends up distributed across many systems, which can be an issue when searching for threats. CISO Rob Wood advocates a more centralized approach.
Robert Wood discusses the risks of data silos and provides three actionable steps for how to break them down or control their impact.
Knowing the types of data that cybercriminals target for identity theft, financial fraud, or other malicious activities helps security teams implement effective protection.
Insights from data-driven teams include application telemetry and debugging logs, which can be invaluable from a security standpoint.
Nearly all cloud security incidents are due to customer misconfigurations. Chris Hughes explains how cybersecurity hygiene addresses the problem.
With the rise of generative AI, companies with weak data exfiltration controls are at even more risk of inadvertent disclosure of data, explains Wayne Sadin.