Effective zero trust requires a comprehensive understanding of the organization’s security landscape, a risk-based approach, and a commitment to continuous improvement. Learn how to manage the journey.
Search Results: phishing (84)
The zero trust security framework can protect sensitive data from evolving cyber threats, says Frank Domizio.
Frank Domizio explains why cybersecurity professionals must continuously be on the lookout for ways in which the zero trust security model could become vulnerable to ever-evolving attackers.
Analyst and CISO Frank Domizio lays out how the accelerating use of artificial intelligence (AI) in cybersecurity can ultimately improve a company’s security posture.
CISO Frank Domizio looks at common security vulnerabilities in the retail industry and offers practical ways to mitigate them and boost resilience.
Kieron Allen profiles Top 10 Cybersecurity company Lookout, whose platform provides endpoint security for everything from mobile devices to data stored in the cloud.
La tecnología ChatGPT no es ni buena ni mala, el uso que se le dé dependerá de la intención última del usuario.
CIOs and CISOs must learn to communicate openly to have the types of strong relationships that lead to healthy, successful companies. In this analysis, Kenny Mullican gives tips on how they can achieve them.
Workday has a new co-CEO, who will be sole CEO in a year. Bob Evans shares insights into the new leader’s character.
Kieron Allen explores how the Toucan platform’s decentralized technology and tokenization methods help companies offset carbon.
Artificial intelligence is now a front-line tool in combating cyber threats and delivering data-driven insights. AI expert and Acceleration Economy Practitioner Analyst, Ronak Mathur explores the capabilities of AI to bolster cybersecurity measures.
CISO practitioner analyst Chris Hughes emphasizes why today’s CISOs need to prioritize their agenda to quantify risk, embrace zero trust, and fight talent burnout
Analyst Robert Wood explains a strategy for resolving data breaches that entails getting inside your adversary’s head.
Considering Salesforce’s dismal Q3 results, Bob shares what he thinks the company must examine to get back on the growth train.
In this special report, John Siefert, Chris Hughes, and Tom Smith discuss the role of cybersecurity in today’s market, and why now it’s about more than just mitigating threats, and not just for highly regulated industries such as the public sector and financial services.
Janet looks at this year’s Verizon Data Breach Investigations Report (DBIR) and singles out a few facts that can help organizations evaluate risk in partnership strategy.
In Data Modernization Minute, Ep. 32, Wayne Sadin explains Microsoft’s Power BI Suite within the context of Walmart, the world’s largest retailer. The company’s financial team has recently announced their adoption of this tool.
The increasingly in-demand IBM Consulting has found that its clients and prospects are finding significant value in IBM’s ability to offer not only a full portfolio of modern technology — particularly in the cloud — but also deep industry expertise built over the decades.
Doing things the way they’ve always been done is never a good strategy where technology is concerned, and security is no exception, writes Robert Wood.
In Cybersecurity Minute Episode 28, Chris Hughes discusses how malicious actors compromised more than 130 business organizations through poor two-factor authentication practices.