Saturday, May 21, 2022
Home Interviews

Interviews

Tackling the Cybersecurity Challenges of Open-source Platforms-01-01

Tackling the Cybersecurity Challenges of Open-source Platforms

"The best way to foster a DevSecOps culture is to provide developers with the appropriate toolset, like security command-line applications (CLI) and ad-hoc access...
Strengthening the Cybersecurity of Active Directory to Mitigate CyberRisk-03

Strengthening the Cybersecurity of Active Directory to Mitigate Cyber-Risk

"Organizations must be able to manage their identity security in hybrid environments that use both on-premises Active Directory and Azure Active Directory services on...
Pauline Losson

A Data Breach Today, a Ransomware Attack Tomorrow

“Organizations should not think twice about implementing advanced security features like multi-factor authentication (MFA). The key to finding a good balance between usability and...
Ian McShane

The State of Cybersecurity in 2022 – Addressing the Skills Shortage

  “Businesses should prioritize retaining their cybersecurity talent, and investing in their security operations. Those that prepare and invest now, will be in a much...
Carolyn Crandall

Minimizing the Blast Radius of Credential Theft

Deployment of concealment techniques to sensitive files, folders, credentials, and other assets, will also limit an attack’s severity because attackers cannot exploit or steal...
Stopping Data Leaks in the Automotive Sector

Stopping Data Leaks in the Automotive Sector

“Today’s complex digital landscape requires a defense-in-depth approach. Automotive manufacturers should be deploying multiple layers of security,” says Pauline Losson, Global Director of Analysts...
Adrian Rowley

CIOs Need To Identify the Security Gaps in Hybrid Cloud Environment

“As IT teams are looking for solutions to cope with the data deluge (a product of 5G rollouts around the world), automation is likely...
Amir Jerbi

Embracing Cloud-Native Security in the Digital Era

“As with many technologies, with increased usage comes increased risk of sophisticated attacks, particularly those aimed at the supply chain. This is just one area we’re of where we’re seeing an increase...
Deep Learning and how it is Transforming the Cybersecurity Landscape

Deep Learning and how it is Transforming the Cybersecurity Landscape

“Currently, I see a race between using artificial intelligence to engineer and reverse engineer detection and prevention capabilities. Because the solution of deep learning...
The Nuances of Security in a Digital Infrastructure

The Nuances of Security in a Digital Infrastructure

In an exclusive interview with ITSecurityWire, Bill Franklin, Senior Director of Cloud Engineering at AVANT says “Measuring a company’s risk, business flow and driving...

Latest posts