Multi-cloud environments come with unique challenges, and analyst Rob Wood provides best practices for reducing security threats through training for employees with access to cloud resources.
Search Results: risk (1578)
Robert Wood discusses the risks of data silos and provides three actionable steps for how to break them down or control their impact.
With the rise of generative AI, companies with weak data exfiltration controls are at even more risk of inadvertent disclosure of data, explains Wayne Sadin.
Corporate users need to take pause and consider the potential for bias before they move too quickly into generative AI. Analyst Wayne Sadin explains why.
Acceleration Economy analyst Chris Hughes breaks down the latest findings from Sysdig’s 2023 Cloud-Native Security and Usage report.
In this Cybersecurity Minute, Robert Wood explains how to integrate threat modeling solutions into cybersecurity solutions to manage risks.
Low-code/no-code platforms begot citizen developers and their innovative solutions, but a lack of formal training brings risks that must be managed.
AI is increasingly mainstream, so it’s more important than ever to make sure that all organizations implement smart, unbiased security protocols.
Frank Domizio explains the benefits of cybersecurity supply chain risk management (C-SCRM) and how to pick the right tools.
In episode 41, Wayne Sadin uses the airline’s recent flight cancellation crisis to demonstrate the need to look at all of your IT risks, not just one of them.
Analyst Robert Wood shares the three areas CISOs should focus on to improve their performance: data, supply chain risk, and team cultures.
CISO practitioner analyst Chris Hughes emphasizes why today’s CISOs need to prioritize their agenda to quantify risk, embrace zero trust, and fight talent burnout
Pushing its sweeping co-creation model with global banks to new levels, IBM will help these financial institutions become more secure, compliant, and resilient but also boost performance.
Learn about the top 5 cloud services risks, how to mitigate the risks, and how to secure cloud operations with the Lookout Security Platform.
During the Women in Tech session at Community Summit 2022, Cathy Richards-Ingram from Avalara, Jennifer Harris from TMC, and Ann D’Emilio from Vertex shared their experiences and advice as women in the technology field.
Analyst Chrus Hughes takes a look at EPSS, a new approach to evaluating vulnerability that takes into account not only criticality and scores, but also exploitability.
Janet looks at this year’s Verizon Data Breach Investigations Report (DBIR) and singles out a few facts that can help organizations evaluate risk in partnership strategy.
Most companies still struggle with managing credit manually. Keeping track of customers, payment terms, ratings and more in a mix…
At Summit North America 2022, Gayle Keller delivered the Women in Tech session keynote, which focused on taking risks, closing the gender gap, and achieving sustainable empowerment.
Quantifying cyber risk helps board members and other business leaders see the importance of cybersecurity investment. As Chris Hughes explains, the FAIR model offers a framework to do this.



















