Conway’s Law is a useful lens through which to examine security in large organizations, says analyst Robert Wood, noting that silos introduction friction.
Search Results: cybersecurity (1488)
Robert Wood explains how a linear dashboard view of logs that aligns with SaaS and PaaS providers can lead to more effective cybersecurity investigations.
Analyst and CISO Frank Domizio lays out how the accelerating use of artificial intelligence (AI) in cybersecurity can ultimately improve a company’s security posture.
ServiceNow plans to integrate technology from Snyk, a Cybersecurity Top 10 company, into ServiceNow’s vulnerability response platform.
Janet Schijns outlines eights services a cybersecurity channel partner can offer your company, especially if you’re not resourced to hire a CISO.
CISO Frank Domizio looks at common security vulnerabilities in the retail industry and offers practical ways to mitigate them and boost resilience.
Frank Domizio explains how AI is becoming increasingly popular within the realm of cybersecurity, noting the applications of this technology.
Software bills of materials are important because they serve as standardized artifacts in developmental processes, as well as for security and compliance.
Kieron Allen looks at new data from Cyberseek regarding a shortage of skilled cybersecurity professionals, and what this means for organizations.
Wayne Sadin explains how data governance came to be so messy, and how strategic use of cloud and cybersecurity can impose order.
Kieron Allen explains how Lookout, a Top 10 Cybersecurity as a Business Enabler company, adapts to customer needs with a unified cybersecurity framework.
The shift to renewable energy leaves oil, gas, and electrical infrastructure vulnerable to threats such as ransomware, DDoS, and more, CISO Chris Hughes explains.
Kieron Allen and Aaron Back discuss how the companies on Acceleration Economy’s new Top 10 shortlists were chosen — and who chose them.
The World Economic Forum (WEF) is anticipating a cyberstorm, which calls for a global, unified response across geopolitical borders.
Frank Domizio covers four features of data backup and recovery software, and why they’re essential to protect against disasters, ransomware, and other incidents.
Kieron Allen and Chris Hughes discuss how our cybersecurity analysts determined which companies made the new Top 10 list of Cybersecurity Business Enablers.
The Top 10 providers model – a Cloud Wars staple – now includes the top four tech pillars: cloud, cybersecurity, AI/hyperautomation, and data.
John Siefert, Aaron Back, and Tom Smith introduce our new Top 10 lists for data modernization, hyperautomation, and cybersecurity.
Frank Domizio explains the benefits of cybersecurity supply chain risk management (C-SCRM) and how to pick the right tools.
In this CXO interview, Tony Uphoff speaks with Maria Roat, former U.S. Deputy Federal CIO and CIO Summit speaker. The two discuss Maria’s background, the lessons she has learned, the role of curiosity, and advice for young CIOs.