Cymmetria founder and CEO Gadi Evron explains the complex world of cyber deception, and how the principles of information control are helping to secure our systems.
Ping Identity's Patrick Harding joins Infoworld's Fahmida Rashid to take a look into the future of passwords and authentication for our increasingly complex online lives.
CSO's Steve Ragan talks with Cybereason's Chief Product Officer Sam Curry about the rising threat of attacks from nation-state actors, and how to address the unique nature of their attacks.
Infoworld Senior Writer Fahmida Rashid chats with Palo Alto Networks' CSO Rick Howard about the biggest cybersecurity challenges facing businesses working in the cloud in 2017.
Palo Alto Networks' CSO Rick Howard sits down at RSA 2017 with Infoworld's Fahmida Rashid to talk about what the Cybersecurity Canon is, and his top picks for inclusion this year.
In the latest episode of Security Sessions, CSO Editor-in-chief Joan Goodchild speaks with Imad Mouline, CTO at Everbridge, about how involved CSOs need to be with planning for an active shooter or other emergency at their company. While many leave physical security to others in the company, the CSO can be key to determining communications plans for alerting employees.
At ShmooCon 2017, CSO's Steve Ragan chats with Marc Langer, president of Recovery Point, about the questions that many companies often miss when choosing a data recovery system or process.
In part two of CSO's interview with Gabe Bassett from Verizon Enterprise Solutions at ShmooCon 2017, Steve Ragan and Bassett discuss why vulnerabilities are not the major vectors that hackers use to get into a company's infrastructure.
At ShmooCon 2017, CSO's Steve Ragan sits down with Gabe Bassett, senior information security data Scientist at Verizon Enterprise Solutions. The two discuss how attack surfaces work within the Verizon Data Breach Investigations Report (DBIR) and how companies can use those to assess their risk profiles.
In the latest episode of Security Sessions, CSO Editor-in-Chief Joan Goodchild chats with CSO Publisher Bob Bragdon about recent research around IT budgets, and how much of the budgets are allocated towards security. They also discuss where the money is going, how much is flowing to automation and whether the CSO (or CISO) can get the attention of the board to get more money for security projects.
If you thought 2016 was a fun time to be in IT, wait until 2017 hits. Network World presents an overview of five technologies and trends that will "shake things up" in the world of enterprise networking for the new year.
In this episode of Security Sessions, CSO Editor-in-Chief Joan Goodchild chats with Stu Sjouwerman, CEO of KnowBe4, about how cybercriminals are using the cloud model for ransomware development.
In the latest episode of Security Sessions, CSO Editor-in-Chief Joan Goodchild chats with Stephen Boyer, CTO and co-founder of BitSight, about the recent DNS attacks against Dyn, and how CSOs can prepare their systems against future attacks.
CSO Editor-in-Chief Joan Goodchild sits down with Kevin O'Brien, founder and CEO of GreatHorn, to discuss ways that security leaders can fend off spear phishing attempts aimed at the executives at their companies.
IBM Security has launched a network-emulation environment where corporate teams can play out attack scenarios so they are better prepared for incidents they might face in the real world.
In the latest episode of Security Sessions, CSO Editor-in-Chief Joan Goodchild chats with Michel Bruemmer from Experian Data Breach Resolution about its annual data breach response guide. The guide offers tips and process improvements for companies putting together a plan of attack when breaches occur.