Software composition analysis tools are valuable assets to secure systems and protect organizations, says Frank Domizio, but they will also directly benefit software developers.
Search Results: cybersecurity (1482)
In this CEO Outlook moment, Thomas Kurian explains why he thinks edge computing, cybersecurity, and the mainstreaming of AI will have the most impact this year.
How do cybersecurity companies manage the complex nature of IT environments? In this Cybersecurity Minute, Robert Wood explains why portfolio companies have the solutions.
Analyst Paul Swider takes a look at five healthcare priorities and what they can tell us about where healthcare is headed, including AI, resolving cost issues, and more.
Do you know how to respond after a security breach has happened? This “for CISO, by CISO” guidebook provides first-person actionable insights from practitioners.
Frank Domizio explains how a modern CISO can communicate security needs and strategies to top leaders, peers, and their cybersecurity teams.
Tools are a core part of cybersecurity, but too many can lead to bloat. CISO Analyst Robert Woods explains how to ensure portfolios are up to date and supporting a sustainable work environment.
In ep. 29, Kieron Allen explains why a digital trust strategy is essential for brands and describes how a company can successfully implement one.
CISO practitioner analyst Chris Hughes emphasizes why today’s CISOs need to prioritize their agenda to quantify risk, embrace zero trust, and fight talent burnout
In ep. 26 of the Acceleration Economy Minute, Kieron Allen explains how broad spectrum automation is a cost-efficient investment for organizations looking to automate more processes.
A sustainable future is not out of reach but depends on how we continue efforts to build resilient cybersecurity frameworks which support the critical infrastructures, IoT, and open-source solutions we all depend on.
In ep 29 of the Growth Swarm podcast, the hosts discuss recent key trends and look ahead to how the “four pillars” will help businesses thrive in the future.
Pushing its sweeping co-creation model with global banks to new levels, IBM will help these financial institutions become more secure, compliant, and resilient but also boost performance.
Kicking off a roundtable series on the top cybersecurity companies, John Siefert is joined by Aaron Back, Chris Hughes, and Lookout Chief Strategy Officer Aaron Cockerill to discuss the company’s unique origins and solutions to cybersecurity.
Too often people only think about cybersecurity after a negative event, but it’s important to be risk-ready all the time, as Frank explains.
In ep. 33 of the Cybersecurity Minute, Frank Domizio explains how organizations have “tabletop training” for incident response in the event of a power outage or ransomware attack.
In ep. 17, Kieron reviews Bill Doerrfeld’s recent report on workplace burnout among software development and cybersecurity teams.
Bill reviews ThreatQuotient’s “2022 State of Cybersecurity Automation” report, which finds that the majority of organizations experience pain problems implementing these initiatives.
In ep. 10, Kieron explains why cybersecurity professionals must prioritize training on cybersecurity issues and prevention.
In this special report, John Siefert, Chris Hughes, and Tom Smith discuss the role of cybersecurity in today’s market, and why now it’s about more than just mitigating threats, and not just for highly regulated industries such as the public sector and financial services.