This year’s high-profile supply chain attacks underscore the gravity of lateral threats. Splunk’s Yassir Abousselham says zero trust and SOC modernization strategies are key.
The pervasive attack on government and commercial IT systems, via SolarWinds, highlighted the need for zero trust — and powerful analytics tools.
Recent events of 2020 have taught CISOs important lessons defending against agile cyber-adversaries building and executing cyberattacks.
But artificial intelligence still requires time to learn as adversaries grow in size and sophistication, a security expert says.
Greg Otto talks to Dan Young, Founder of QuoLab, about what he’s doing to help keep the lines of information sharing open
The roles of chief information security officers are changing as organizations establish a broader security strategy into their lines of business.
Cybersecurity leaders from Deloitte discuss the top strategies executives should keep in mind in building identity management and governance with modern solutions.
What goes on in the short term? How do you stop the bleeding? How do you recover?
Oak Ridge National Laboratory’s chief information security officer shares steps the research institute took to ensure security and integrity of its data.