New data from Palo Alto Networks’ incident response team highlights the expanding set of extortion tactics being used as part of ransomware attacks.
Search Results: phishing (88)
Environmental, social, and governance frameworks are on the rise, and they must be crafted with enough security considerations to ward off increased cyber threats.
Frank Domizio explora el uso de Inteligencia Artificial en un entorno dinámico de ciberseguridad, sus beneficios y retos.
An in-depth look at automated vulnerability scanning within financial software, how it works, as well as top tools and best practices to get the job done.
Effective zero trust requires a comprehensive understanding of the organization’s security landscape, a risk-based approach, and a commitment to continuous improvement. Learn how to manage the journey.
The zero trust security framework can protect sensitive data from evolving cyber threats, says Frank Domizio.
Frank Domizio explains why cybersecurity professionals must continuously be on the lookout for ways in which the zero trust security model could become vulnerable to ever-evolving attackers.
Analyst and CISO Frank Domizio lays out how the accelerating use of artificial intelligence (AI) in cybersecurity can ultimately improve a company’s security posture.
CISO Frank Domizio looks at common security vulnerabilities in the retail industry and offers practical ways to mitigate them and boost resilience.
Kieron Allen profiles Top 10 Cybersecurity company Lookout, whose platform provides endpoint security for everything from mobile devices to data stored in the cloud.
La tecnología ChatGPT no es ni buena ni mala, el uso que se le dé dependerá de la intención última del usuario.
CIOs and CISOs must learn to communicate openly to have the types of strong relationships that lead to healthy, successful companies. In this analysis, Kenny Mullican gives tips on how they can achieve them.
Workday has a new co-CEO, who will be sole CEO in a year. Bob Evans shares insights into the new leader’s character.
Kieron Allen explores how the Toucan platform’s decentralized technology and tokenization methods help companies offset carbon.
Artificial intelligence is now a front-line tool in combating cyber threats and delivering data-driven insights. AI expert and Acceleration Economy Practitioner Analyst, Ronak Mathur explores the capabilities of AI to bolster cybersecurity measures.
CISO practitioner analyst Chris Hughes emphasizes why today’s CISOs need to prioritize their agenda to quantify risk, embrace zero trust, and fight talent burnout
Analyst Robert Wood explains a strategy for resolving data breaches that entails getting inside your adversary’s head.
Considering Salesforce’s dismal Q3 results, Bob shares what he thinks the company must examine to get back on the growth train.
In this special report, John Siefert, Chris Hughes, and Tom Smith discuss the role of cybersecurity in today’s market, and why now it’s about more than just mitigating threats, and not just for highly regulated industries such as the public sector and financial services.
Janet looks at this year’s Verizon Data Breach Investigations Report (DBIR) and singles out a few facts that can help organizations evaluate risk in partnership strategy.


















