Managing security data in the modern enterprise has been complicated by increases in types, volume and speed of information combined with constantly evolving internal & external threats. We explore these issues from the front lines with our practitioner faculty and partners to provide you, our information security audience with improved Security Intelligence and ammunition to secure your companies resources.
Virtual desktop infrastructure has been around for years as an option to secure hardware and systems, but VDI often causes friction for the business and can be unpopular with users. Island Security is taking on those challenges with its Enterprise Browser by managing everything in the browser.
Everyone has their favorite threat intelligence feeds, and information sharing is a must between public and private sectors. But don't overlook the power of cyber human intelligence, says Michael DeBolt of Intel 471. In fact, HUMINT is an imperative, not an option, he says.
When you create proprietary code, even using a component of open-source code within a subcomponent could cause your project to become open-source code.Jeanette Sherman of Mend Security discusses the need to identify open-source code and the license types being used.
Post-digital transformation, in a world of hybrid work and multi-cloud environments, government agencies in particular sometimes struggle to detect and respond to threats across the expanded attack surface. Peter Romness of Cisco talks about new strategies to defend these broad environments.
Companies have rapidly adopted digital strategies to fuel growth and profitability, yet many of these changes have inadvertently accelerated the risk of cyberattacks. As evidenced by the recently released 2023 OpenText Cybersecurity Threat Report, cybercriminals are taking advantage of these gaps.
Everyone has their favorite threat intelligence feeds, and information sharing is a must between public and private sectors. But don't overlook the power of cyber human intelligence, says Michael DeBolt of Intel 471. In fact, HUMINT is an imperative, not an option, he says.
Network boundaries have dissipated while changes in regulation and customer approaches to trust now require more advanced authentication and the ability to treat each authentication in relation to its specific risk level. Broadcom's Mary Ann Furno discusses these issues.
Gartner says by 2025, 50% of companies will be using MDR. What's the compelling business case, and how does it translate to meet the needs of public sector entities? Rob Lalumondier of Sophos shares five reasons to use MDR, as well as key questions to ask when selecting a provider.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing securityintelligence.inforisktoday.com, you agree to our use of cookies.