After a breach, you’ll need help from an incident response team, either in-house or third party. Frank explains how and what to look for.
Search Results: cybersecurity (1488)
CISO Robert Wood details three techniques to analyze security breaches so that organizations can prevent them in the future.
In this Data Modernization Battleground moment, Chris says that cybersecurity professionals must understand data inventory, how businesses are using data, and who has access to data.
Cybersecurity has evolved beyond the “office of ‘no'” to a true business enabler that requires an on-going vigilant effort to keep a resilient security posture
It’s common for the C-suite to look at cybersecurity efforts with fear, uncertainty, and doubt (FUD). Here’s why that needs to stop, and how to do it.
In this CloudWorld News Desk interview, Oracle Senior VP of Cloud Infrastructure Mahesh Thiagarajan explains why some users are still reluctant to engage with multi-cloud platforms.
Quantifying cyber risk helps board members and other business leaders see the importance of cybersecurity investment. As Chris Hughes explains, the FAIR model offers a framework to do this.
Doing things the way they’ve always been done is never a good strategy where technology is concerned, and security is no exception, writes Robert Wood.
What’s in a vulnerability score? Chris Hughes explains what these are, where they come from, and how cybersecurity professionals should approach them.
In Episode 51, Wayne uses a bet he once made with a CISO as a jumping-off point to discuss how the C-suite should approach cybersecurity.
In this Cloud Wars Expo Moment, Chris Hughes explains why the user experience should inform the systems designed by cybersecurity professionals.
Acceleration Economy analyst and Paragon Films CIO Kenny Mullican shares data modernization tips from the tech executive’s perspective.
When it comes to cyber risk quantification, cybersecurity as an industry has become abysmal. How can organizations overcome these challenges?
Goya Foods’ Suvajit Basu says VMWare is one of the world’s most important tech firms. He, Bob Evans, & Tony Uphoff discuss the Broadcom deal.
Robert Wood offers three ways that a positive culture can be created to attract and keep the right cybersecurity talent for your organization
In this Cloud Wars Expo Moment, Chris Hughes explains why bringing cybersecurity into the development workflow is key to empowering engineering teams with guardrails rather than gates.
Chris Hughes singles out Zero Trust, Multi-Cloud IAM, compliance innovation, and other cybersecurity trends that surfaced at Cloud Wars Expo.
Chris shares his Cloud Wars Expo takeaways, including an emphasis on industry-specific clouds, stronger data security, and supply chains.
In the latest Cybersecurity Minute, Ep. 20, Chris summarizes the White House’s latest move to curb cyberattacks with greater collaboration.
As IT moves to the cloud, new threats emerge. DevSecOps is the answer to incorporating security throughout the continuous software lifecycle.