Identity is changing with the fusion of public and private trust models. Entrust Datacard's Ray Wizbowski discusses the shifting landscape and how best to secure it.
Organizations understand and appreciate the efficiencies and cost savings of moving to the cloud. But what are the potential impediments they often overlook? Peter Martini of iboss offers guidance.
In today's extended enterprise, with organizations leveraging supply chains and the cloud, microsegmentation has become a hot network security technology. Tom Patterson of Unisys discusses the trend, as well as behavioral biometrics.
After years of focus, the needle is moving positively toward improving medical device security. But what about the growing cybersecurity issues associated with enterprise IoT? Mac McMillan of CynergisTek shares his concerns.
Hot cybersecurity trends under discussion at this year's RSA Conference include artificial intelligence, facial recognition, protecting not just data but also knowledge, as well as rapid data breach response, says Chris Pierson, CEO of Binary Sun Cyber Risk Advisors.
Blockchain is high on the hype meter in 2018, but Gartner's Avivah Litan is encouraged by practical applications of the technology to secure financial transactions, protect identity and help organizations fight fraud.
Beset by increasingly aggressive threat actors, many security leaders have decided their best defense is a stronger offense. John Wilson of Agari offers insights into the active defense movement - including the ethical and legal concerns associated with it.
The terms artificial intelligence and machine learning are in abundant supply at this year's RSA Conference. Sam Curry of Cybereason cut through the hype to explain how he sees these technologies augmenting cybersecurity.
Organizations too often prioritize data breach prevention at the expense of data breach response - or vice versa, depending on current fashion - when an emphasis on both remains mandatory, warns Art Coviello, the retired chairman of RSA.
Cybersecurity pros need to apply the Darwinian approach of "survival of the fittest" to cybersecurity to navigate the risk landscape and raise the industry baseline for security, says Dan Schiappa of Sophos.
We have been talking about the cybersecurity skills gap for a decade, but the pain is truly being felt now as businesses churn out new apps with insufficient security, says WhiteHat Security's Craig Hinkley. What is machine learning's role?
Thirty-four companies have signed on to the Microsoft-led Cybersecurity Tech Accord, which is aimed at protecting civilians from cybercriminal and state-sponsored attacks. The agreement crucially includes a pledge not to help governments with cyberattacks
For the past year, the buzz about artificial intelligence and machine learning has been overwhelming. But Ricardo Villadiego of Cyxtera sees promise in how these technologies can help organizations fight back against fraudsters.
Organizations are increasingly incorporating open source code elements into their software development to accommodate agile development methodologies and swift go-to-market requirements, but not many are addressing the security concerns that follow, says CA Veracode CTO Chris Wysopal.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.eu, you agree to our use of cookies.