Friday, September 20, 2024

Interviews

Stopping Data Leaks in the Automotive Sector

Stopping Data Leaks in the Automotive Sector

“Today’s complex digital landscape requires a defense-in-depth approach. Automotive manufacturers should be deploying multiple layers of security,” says Pauline Losson, Global Director of Analysts...
Adrian Rowley

CIOs Need To Identify the Security Gaps in Hybrid Cloud Environment

“As IT teams are looking for solutions to cope with the data deluge (a product of 5G rollouts around the world), automation is likely...
Embracing Cloud-Native Security in the Digital Era

Embracing Cloud-Native Security in the Digital Era

“As with many technologies, with increased usage comes increased risk of sophisticated attacks, particularly those aimed at the supply chain. This is just one area we’re of where we’re seeing an increase...
Deep Learning and how it is Transforming the Cybersecurity Landscape

Deep Learning and how it is Transforming the Cybersecurity Landscape

“Currently, I see a race between using artificial intelligence to engineer and reverse engineer detection and prevention capabilities. Because the solution of deep learning...
The Nuances of Security in a Digital Infrastructure

The Nuances of Security in a Digital Infrastructure

In an exclusive interview with ITSecurityWire, Bill Franklin, Senior Director of Cloud Engineering at AVANT says “Measuring a company’s risk, business flow and driving...
Incorporating Zero-Trust Model Approach can Strengthen Endpoint Security

Incorporating Zero-Trust Model Approach can Strengthen Endpoint Security

“With sophisticated cyber-attacks becoming increasingly commonplace, it’s clear that organizations need to integrate holistic cybersecurity solutions and management tools into their technologies stacks to...
CISOs taking Steps to Bridge Cybersecurity Skill Gap

CISOs taking Steps to Bridge Cybersecurity Skill Gap

“CISOs must bridge the skill gaps by arranging the right training for all employees designated for IT security duties. They should also encourage organizations...
How Integrating Zero-Trust Help Organizations Strengthen their Cyber Resilience

How Integrating Zero-Trust Help Organizations Strengthen their Cyber Resilience

“Zero Trust, along with micro-segmentation, is becoming highly recognized as a strong defense against cyber threats as it limits the spread of any infection...
The Psychology of Phishing

The Psychology of Phishing

“There is no silver bullet that can completely eradicate all risks of phishing attacks, but there are many actions that can mitigate the risks...
Digital Certificates Hold the Key to Strengthen Cybersecurity Posture

Digital Certificates Hold the Key to Strengthen Cybersecurity Posture

“The proliferation of digital keys, certificates and secrets means that IT and security leaders recognize the need for an enterprise-wide cryptography and machine identity...

Latest posts