The path to success requires artificial intelligence and machine learning to supercharge the expertise and experience of an equally innovative and warm-bodied defender working as part of an enterprise security operations center and outsourced services like managed detection and response.
Jerry Caponera, Head of Risk Strategies at ThreatConnect, discusses the importance of developing a risk-oriented view into cybersecurity and why cyber risk needs to be quantified in the same way as operational risk or credit risk.
Pressing the reset button on security is only possible by disregarding the old-school ring-fencing and the rigid firewalls of the moat-castle mindset and embracing the zero trust mentality.
Industry experts can help you to understand not only the occupational fraud risks that come hand-in-hand with a “work from anywhere” model, but also how to address them with the latest biometrics.
The Cybersecurity and Infrastructure Security Agency created a new de-escalation series to help critical infrastructure owners and operators recognize, assess, de-escalate and report behaviors that raise concern.
Increasing workloads and attacks on organizations are a major source of burnout among security professionals. David Bradbury, Chief Security Officer at Okta, explains how hiring globally can help reduce the burden on security employees that are already overworked.
Ensure your employees understand the security risks of social media, provide awareness training and implement best practice policies for smarter socializing.
All too often, people feel they need to push their personal limits at work, at the expense of their mental, physical and emotional health. How can leadership combat burnout across security teams by prioritizing an employee's well-being?
The open-source and developer community has adopted Open Policy Agent (OPA) as the de facto standard for authorization.
There are three critical ways OPA can help organizations solve for authorization: