The case for transitioning to a single, multi-cloud IAM platform
SAIC Cybersecurity Director Eric Brown talks with Axiad co-founder Bassam Al-Khalidi about the rationale for moving to a single identity and access management platform.
Cyber Everywhere: The growing threat of mis-, dis-, and malinformation
Deloitte cybersecurity leaders discuss the risks posed by MDM and share strategies to help combat these threats, often taking advantage of existing infrastructure and processes.
Practical strategies to establish a zero-trust security environment
Splunk security strategist James Young highlights lessons learned embracing zero-trust practices internally and what agencies can learn from the experience.
Aiming for the right defense strategy against ransomware threats
Critical infrastructure sectors are increasingly exposed to ransomware threats. Security expert Steve Caimi explores key security practices for a more robust posture.
Well-funded, organized attacks require strategic counter-defense strategies
This year’s high-profile supply chain attacks underscore the gravity of lateral threats. Splunk’s Yassir Abousselham says zero trust and SOC modernization strategies are key.
How zero trust helped insulate Splunk from supply chain attack
The pervasive attack on government and commercial IT systems, via SolarWinds, highlighted the need for zero trust — and powerful analytics tools.