Thursday, May 9, 2024

Interviews

Strengthening the Cybersecurity of Active Directory to Mitigate CyberRisk-03

Strengthening the Cybersecurity of Active Directory to Mitigate Cyber-Risk

"Organizations must be able to manage their identity security in hybrid environments that use both on-premises Active Directory and Azure Active Directory services on...
Pauline Losson

A Data Breach Today, a Ransomware Attack Tomorrow

“Organizations should not think twice about implementing advanced security features like multi-factor authentication (MFA). The key to finding a good balance between usability and...
Ian McShane

The State of Cybersecurity in 2022 – Addressing the Skills Shortage

  “Businesses should prioritize retaining their cybersecurity talent, and investing in their security operations. Those that prepare and invest now, will be in a much...
Carolyn Crandall

Minimizing the Blast Radius of Credential Theft

Deployment of concealment techniques to sensitive files, folders, credentials, and other assets, will also limit an attack’s severity because attackers cannot exploit or steal...
Stopping Data Leaks in the Automotive Sector

Stopping Data Leaks in the Automotive Sector

“Today’s complex digital landscape requires a defense-in-depth approach. Automotive manufacturers should be deploying multiple layers of security,” says Pauline Losson, Global Director of Analysts...
Adrian Rowley

CIOs Need To Identify the Security Gaps in Hybrid Cloud Environment

“As IT teams are looking for solutions to cope with the data deluge (a product of 5G rollouts around the world), automation is likely...
Embracing Cloud-Native Security in the Digital Era

Embracing Cloud-Native Security in the Digital Era

“As with many technologies, with increased usage comes increased risk of sophisticated attacks, particularly those aimed at the supply chain. This is just one area we’re of where we’re seeing an increase...
Deep Learning and how it is Transforming the Cybersecurity Landscape

Deep Learning and how it is Transforming the Cybersecurity Landscape

“Currently, I see a race between using artificial intelligence to engineer and reverse engineer detection and prevention capabilities. Because the solution of deep learning...
The Nuances of Security in a Digital Infrastructure

The Nuances of Security in a Digital Infrastructure

In an exclusive interview with ITSecurityWire, Bill Franklin, Senior Director of Cloud Engineering at AVANT says “Measuring a company’s risk, business flow and driving...
Incorporating Zero-Trust Model Approach can Strengthen Endpoint Security

Incorporating Zero-Trust Model Approach can Strengthen Endpoint Security

“With sophisticated cyber-attacks becoming increasingly commonplace, it’s clear that organizations need to integrate holistic cybersecurity solutions and management tools into their technologies stacks to...

Latest posts