Bill Doerrfeld explains reveals why old-fashioned compliance practices can’t guarantee successful outcomes; real-time data and automation can help.
CISO
The right people, processes, and technology can help mitigate the security risks of a multi-cloud environment, says analyst Frank Domizio.
Developers need guidance from CISOs to protect corporate data stores, ensure compliance, and spot disgruntled employees, and more, analysts Chris Hughes and Paul Swider explain.
Organizations aiming to be “data intelligent” must have a foundation of data governance in place that spans all facets of the business. Why? Customer dazzle which leads to revenue growth.
Wayne Sadin shares why the advent of generative AI puts pressure on organizations to tighten up their data and security strategies to avoid bias and protect sensitive data.
Knowing the types of data that cybercriminals target for identity theft, financial fraud, or other malicious activities helps security teams implement effective protection.
With the rise of generative AI, companies with weak data exfiltration controls are at even more risk of inadvertent disclosure of data, explains Wayne Sadin.
Frank Domizio explains how partnering with a CISO can provide expertise, tools, and support to ensure that sensitive data remains secure.
John Siefert, Wayne Sadin, Chris Hughes, and John Muehling discuss why data modernization needs require C-suite execs to collaborate.
Janet Schijns outlines eights services a cybersecurity channel partner can offer your company, especially if you’re not resourced to hire a CISO.
Software bills of materials are important because they serve as standardized artifacts in developmental processes, as well as for security and compliance.
CISO Chris Hughes explains why Chief Data Officers (CDOs) and Chief Information Security Officers (CISOs) need to work together to drive data governance.
Low-code/no-code platforms begot citizen developers and their innovative solutions, but a lack of formal training brings risks that must be managed.
John Siefert, Chris Hughes, Frank Domizio, and Rob Wood explain why applying software composition analysis (SCA) early in the development cycle makes it easier to address security issues when they arise.
CIOs and CISOs must learn to communicate openly to have the types of strong relationships that lead to healthy, successful companies. In this analysis, Kenny Mullican gives tips on how they can achieve them.
Learning when to say no is an important skill for CISOs, particularly, Robert Wood explains, when it comes to trendy or complex technologies and partnerships.
How do cybersecurity companies manage the complex nature of IT environments? In this Cybersecurity Minute, Robert Wood explains why portfolio companies have the solutions.
Frank Domizio explains how a modern CISO can communicate security needs and strategies to top leaders, peers, and their cybersecurity teams.
Analyst Robert Wood shares the three areas CISOs should focus on to improve their performance: data, supply chain risk, and team cultures.
CISO practitioner analyst Chris Hughes emphasizes why today’s CISOs need to prioritize their agenda to quantify risk, embrace zero trust, and fight talent burnout