An exploration of the NSA’s software supply chain security guidance and how it can help organizations fortify overall cybersecurity.
Search Results: CISO (335)
In 2024, the challenges of AI adoption, cloud migration, and cultural shifts take center stage for CIOs striving to align IT with business.
In this report, Chris Hughes identifies five products — from CloudStrike, NetRise, Palo Alto Networks, Wiz, and Zscaler — that equip CISOs to combat the latest threats.
Cisco is positioning itself for the future of cloud-native cybersecurity and AI through acquisitions of Splunk and Isovalent.
Practitioner analysts — CIO, CFO, CISO, and procurement chief — weigh in on how customers and partners can co-create for AI results as part of the Acceleration Economy AI Ecosystem Course.
Snyk’s report on AI-generated code security shows how developers, lured by accelerated production, are unwittingly overlooking risks.
The top 5 cybersecurity products to watch in 2024 feature a healthy dose of generative AI and turnkey platforms, as well as supply chain and cloud protections.
For CISOs and security leaders, grappling with the global ramifications of the EU AI Act becomes paramount, necessitating a proactive stance.
A look at new guidelines for secure AI system development released by the Cybersecurity Infrastructure and Security Agency and the National Cybersecurity Center in the UK, emphasizing a holistic approach throughout the software development lifecycle.
Wiz’s AI Security Posture Management (AI-SPM) addresses security and privacy concerns wrought by AI with comprehensive oversight, inventory management, and misconfiguration checks.
In this guidebook, practitioner analysts and CISOs define how to craft a secure foundation for businesses to thrive in today’s ever-changing digital economy.
The chief data officer (CDO) and chief information security officer (CISO) should agree on encryption, role-based access, zero trust security, and data retention for effective business decisions and risk mitigation.
This guidebook offers insights into
the challenges of hybrid work in the cloud era, the strengths and weaknesses of traditional
cybersecurity mechanisms aimed at addressing those challenges, and why organizations need a CASB with DLP to control access and protect data at a granular level.
The big three cloud service providers AWS, Azure and Google Cloud share but also differ on features and vulnerabilities.
Ajay Sabhlok emphasizes the critical role of technology and collaboration in data management.
Discover how the NVIDIA-VMware partnership empowers manufacturing with cutting-edge AI technology while addressing security and privacy concerns.
Oracle’s cloud infrastructure business is poised to outgrow its cloud applications business by the end of 2024. Artificial intelligence (AI) companies are embracing its platform.
The Securities Exchange Commission (SEC) now requires disclosure of material cybersecurity incidents and processes for managing cybersecurity threats, reflecting the increasing recognition of technology’s role in business and the need for governance in the digital landscape.
Technology partnerships are significant when it comes to harnessing AI capabilities, presenting both potential risks and opportunities, especially for smaller partners.
Discover the top 10 Low-Code/No-Code vulnerabilities and how to secure rapid development environments.



















