Amid a surge in destructive ransomware attacks, Datto CISO Ryan Weeks says we “are losing ground” to the adversaries. He offers insight from a new Global Ransomware Report and the start of a multisector Ransomware Task Force.
COVID-19 didn’t spark digital transformation – it accelerated it. And as a result, what used to be cybersecurity’s IAM exceptions are now the rule. It’s a new reality and a new opportunity for the zero trust model, says Dr. Amit Sinha of Zscaler.
E-commerce and fraud - they evolved and grew together in 2020, and it's time for fraud defenses to do the same. Smriti Jaggi of F5 details how to deploy a multi-layered fraud defense without adding extra friction to the process.
Get answers to all your questions about how to seize cloud opportunities and realize your business’ potential—while also protecting all your data beyond what’s possible on-premises—in this wide-ranging conversation among experts and thought leaders from Microsoft and Barracuda. And a sneak peek of the Cloud to...
In the era of “Verify, then trust,” identity proofing becomes the key challenge for enterprises to meet. Matt Johnson of TransUnion dives into the myths and realities behind such topics as biometrics, authentication and national ID programs.
Kevin O'Brien, CEO and co-founder of GreatHorn, often asks business leaders about their email security, and they say "It's OK." But what's not "OK" is that these defenses are leaving enterprises wide open to vulnerabilities that adversaries are exploiting.
It's an increasingly common story: Live Oak Bank was growing its cloud footprint and had specific needs for a cloud security provider. Bank CISO Thomas Hill is joined by Orca Security CEO Avi Shua to detail the case study and key lessons learned.
It's not just that ransomware attacks are up in 2020; it's that attackers have evolved their tactics and techniques. And Deepen Desai of Zscaler says this means it's time for organizations to completely reimagine their ransomware defenses.
A critical component within millions of consumer and enterprise IoT devices has dangerous software flaws. New research from Forescout Technologies into open-source TCP-IP stacks shows millions of devices from 150 vendors are likely vulnerable.
CIAM awareness has grown exponentially in 2020. Maturity? Not at quite the same pace. Keith Casey of Okta has authored a CIAM playbook, and in this interview offers potential benefits and challenges at each step of the journey.