In this CIO Summit moment, Tony Uphoff, Rob Wood, Chris Hughes, and Frank Domizio discuss communication to stakeholders during a cybersecurity investigation.
Search Results: data security (2134)
Key RSA 2023 takeaways include a strong emphasis on AI defense, the push for an identity-centric security model, and management of the increasingly complex modern attack surface.
Kieron Allen explains how a recent Trend Micro report confirms the proliferation of fake ChatGPT apps, including some containing malware.
In a survey of 1,600 business and tech leaders, Rubrik finds high levels of concern about cybersecurity preparedness, and reveals the extent of ransomware demands.
Chris Hughes and Rob Wood discuss the benefits of thinking in terms of themes and portfolios as a strategy for navigating a busy security expo floor.
Fortinet has become a member in the Joint Cyber Defense Collaborative, contributing its threat intelligence research to strengthen U.S. cyber resilience.
The Cloudera Data Platform (CDP) supports data access, analytics, and governance across diverse architectures and sources.
Cloudera details its SDX design philosophy which embeds security and governance in every product and platform by default.
As mainframe systems are becoming outdated, Wayne Sadin and Adam Meyer discuss how Qlik provides analytics and data migration solutions for modernization.
Tactical threat intelligence is gathering, analyzing, and sharing data to find cyber threats and figure out how to deal with them. Learn how to set up a program.
In this special minute, Paul Swider highlights three prevalent topics from the HIMSS23 Global Health Conference and Exhibition in Chicago.
Threat intelligence gathers and utilizes data about potential threats to keep corporate data safe. It’s especially useful in a multicloud scenario.
Rob Wood explores how organizations should think about generative AI models from a risk perspective, with a special focus on the conversations between security leaders and the C-suite.
Wayne Sadin explains organizations can make the most of their big investments in generating and acquiring data with the help of SaaS data lakehouses.
Generative AI’s rapid rise makes it imperative for security teams to establish policy frameworks and guardrails in order to mitigate risk.
The latest Growth Swarm podcast covers cybersecurity as a business enabler from the CEO perspective, the CMO perspective, and the industry perspective.
The release of Microsoft’s Security Copilot is only the beginning of generative AI use cases for cybersecurity tooling, says Chris Hughes.
A self-service data access model is key to enabling a business to take advantage of valuable information, but it must be implemented in a fashion that ensures fundamental security controls.
Knowledge is power, and in the world of cybersecurity, the threat intelligence lifecycle is key to unlocking that power.
End users with little to no IT background can learn data engineering and data science with the help of low-code/no-code platforms, but they must understand foundational aspects of the fields to avoid creating messy situations.



















