Fortinet has become a member in the Joint Cyber Defense Collaborative, contributing its threat intelligence research to strengthen U.S. cyber resilience.
Cybersecurity
Get a preview of the Generative AI Digital Summit taking place on May 25. It will delve into the future of work, cybersecurity, customer experience, and more.
Connecting with your professional peers at events facilitates valuable cross-pollination of ideas and conversations, say Chris Hughes and Rob Wood.
Strategic threat intelligence can be used to prepare for future threats, and an organization’s strategy should be adopted accordingly.
New service built specifically for managed security service providers (MSSPs) help them secure the most common mobile devices and encourages self-remediation when issues occur.
Tactical threat intelligence is gathering, analyzing, and sharing data to find cyber threats and figure out how to deal with them. Learn how to set up a program.
With DroidGPT, Endor Labs applies generative AI to software development to ensure open-source packages are current and secure.
In this special “on location” minute, Paul Swider shares his impressions from the third day of the HIMSS 2023 Global Health Conference and Exhibition in Chicago.
Threat intelligence gathers and utilizes data about potential threats to keep corporate data safe. It’s especially useful in a multicloud scenario.
Tony Uphoff shares his five top takeaways from the recent Digital CIO Summit, recommending some relevant on-demand sessions along the way.
The latest Growth Swarm podcast covers cybersecurity as a business enabler from the CEO perspective, the CMO perspective, and the industry perspective.
The release of Microsoft’s Security Copilot is only the beginning of generative AI use cases for cybersecurity tooling, says Chris Hughes.
Chris Hughes explains what this synergy means for businesses as they continue to move to the cloud and accumulate data to drive business decisions and outcomes.
ChatGPT may be getting a lot of attention, but generative AI-powered deepfakes have been around for a while, and security teams can’t forget this riskier side of the technology, says Rob Wood.
Knowledge is power, and in the world of cybersecurity, the threat intelligence lifecycle is key to unlocking that power.
John Granger, SVP, IBM Consulting, explains how automating business processes can deliver beneficial outcomes and create opportunities.
The big change of zero trust can be intimidating to some, but security leaders can tailor their communication to make the shift more palatable.
Small- and medium-sized businesses can stay current on the latest threats and detect and prevent attacks with tailored threat intelligence data by leveraging open-source platforms, tools, and communities.
As a business leader today, your success relies on accurate data, real-time analytics, and actionable intelligence. Here are the tools to help you.
Janet Schijns talks about managed service providers and how they can reduce your costs while providing advanced IT skills.