By Topic
By Industry
By Product Category
By Features
By Technology
By Services
By Audience
By Language
Displaying 541 - 570 of 621
Security Roundtable Article
Superforecasting: The Quest for Hyper Precision in Cyber Risk Assessment (Part III)
This is the third in a series of three articles on cybersecurity risk assessment challenges and solutions. In …
Rick Howard, David Caswell, Richard Seiersen,
Security Roundtable Article
What Can Service Providers Do About 5G Security?
We’re about to undergo one of the biggest generational changes in technology—the shift to 5G networks for mobile …
Sean Duca,
Security Roundtable Article
Are You Building an Effective SOC?
Today, businesses spend heavily on cybersecurity. But to get value for their money, they need an overarching strategy. …
Haider Pasha,
Security Roundtable Article
Aligning the Priorities of IT and Cybersecurity Teams
Relationships are tricky. Whether you’re talking about families, workplaces, politics, sports teams or anywhere people have to collaborate, …
Mike Towers,
Security Roundtable Article
A CFO’s Perspective: My 3 Identities of Cybersecurity Leadership
Renowned business guru Peter Drucker had a great quote that has always resonated with me: “Management is doing …
Kathy Bonanno,
Security Roundtable Article
Do You Need Edge Computing to Unleash IoT?
With apologies to the prolific and prescient writer Michael Lewis, there’s a new new thing, and it may …
Jamison Utter,
Security Roundtable Article
How to Become a Credible IT Leader
Years ago, I read an article published by management consulting company Booz & Company that described the challenges …
Naveen Zutshi,
Security Roundtable Article
A Ten Point Cyber Resilience Checklist for Boards
To be successful, companies need to embrace a concept of holistic cyber resilience, which improves their chances of …
Security Roundtable Article
Is Data the New Oil? It Depends
In recent years, data has been called the new oil for its ability to create wealth. But only …
Greg Day,
Security Roundtable Article
Get Ready, CCPA Is No GDPR Lite
The theater was filled to capacity with hundreds of professionals for a conference session about the California Consumer …
Mercedes Cardona,
Security Roundtable Article
3 Questions to Ask in Your Cloud Security Journey
In case you’ve been asleep for the past few years, you’ve undoubtedly begun moving a number of your …
Michael Morrato,
Security Roundtable Article
How Often Is Cybersecurity on Your Board’s Agenda?
Have you ever wondered how much damage cyber thieves—or even well-intentioned but occasionally careless employees and business partners—can …
Paola Zeni,
Security Roundtable Article
Insider Threats Are Growing, Here’s What to Do
In 2013, a contract employee with appropriate access to a number of secure systems exfiltrated unknown amounts of …
M.K. Palmore,
Security Roundtable Article
As GDPR Fines Spiral, Take Privacy by Design Seriously
Data protection has become one of the hottest issues in the boardroom since General Data Protection Regulation (GDPR) …
Fred Streefland,
Security Roundtable Article
CIOs: 5 Remote Work Trends to Watch Out For
This article is part of a series hosted by Security Roundtable and powered by Palo Alto Networks that …
Naveen Zutshi,
Security Roundtable Article
Smart Cities Are Exciting—Until There’s a Cybersecurity Snafu
The ideas behind “smart cities” are becoming more relevant as leaders in government and business seek innovative ways …
Haider Pasha,
Security Roundtable Article
Firmware Security: Watch Out for These 5 Excuses
Earlier in my career, when I was a cybersecurity leader at a global financial services firm, our chief …
Sergej Epp,
Security Roundtable Article
How Can CISOs Tackle the SOC Talent Shortage?
Security operations centers – the units that manage overall cybersecurity within an organization – have been getting a …
Mercedes Cardona,
Security Roundtable Article
Social Engineering and the Art of Fishing
There are many reasons for a successful cybersecurity attack. For example, there could be a misconfiguration in the …
Kevin O'Malley,
Security Roundtable Article
When Bad Guys Use AI and ML in Cyberattacks, What Do You Do?
Artificial intelligence (AI) has become vital in defending organizations against crippling cybersecurity attacks. If your organization is not …
Mercedes Cardona,
Security Roundtable Article
The Value of Being Prepared For Anything
Over the past several years our company, Schlumberger, has undertaken a massive cybersecurity modernization initiative. As part of …
Mario Chiock,
Security Roundtable Article
The Great Reset: The Future of Work and Cybersecurity
Until early 2020, much of the ongoing debate about the shifting landscape of human work focused on whether …
Gary Bolles,
Security Roundtable Article
Forget About the New Normal. We’re in the New Now.
Since the COVID-19 pandemic changed our lives in early 2020, we have all intellectually been in search of …
Bruce Crawford,
Security Roundtable Article
Do You Know What You Don’t Know About Healthcare Cybersecurity? (Better Find Out Fast)
I have a very fascinating and rewarding job: I help our large, busy and diversified healthcare system keep …
Jim Collins,
Security Roundtable Article
Data Manipulation, Law Enforcement and Our Future
While we have traditionally considered data manipulation as the practice of altering documents and other information, that definition …
Dr. Philipp Amann,
Security Roundtable Article
Cyber Hygiene Series: Creating a Culture of Cybersecurity Awareness
In this first installment of the Palo Alto Networks Cyber Hygiene Series, Rinki Sethi, Senior Director of Security …
Rinki Sethi,
Security Roundtable Article
An Empowered Customer is Your Educated Ally
Jennifer Westacott shares how consumer trust and security is a competitive advantage for businesses.
Security Roundtable Staff,
Security Roundtable Article
Cyber Insurance is a Misnomer: View Cyber as Peril When Evaluating Insurance
My title is not meant to suggest that cyber insurance is flawed. To the contrary; it’s a valuable …
Scott Kannry,
Security Roundtable Article
How to Account for Geopolitics in Your Cyber Risk Analysis
In October 2016, the company Dyn fell victim to a cyber attack that had cascading effects on many …
Frédérick Douzet,
Security Roundtable Article
Understanding EU Cybersecurity Legislation: Key Considerations for Executives
The following chapters from Navigating the Digital Age (UK Edition) describe EU cybersecurity legislation and key considerations for executives, including the processes businesses must go through to deal with the changing requirements their IT staff will be asking for (and why): The Long Arm of the Law: Understanding EU Legislation’s Impact on Cybersecurity (Millbank, Tweed, Hadley & McCloy LLP –...
Displaying 541 - 570 of 621