By Topic
By Industry
By Product Category
By Features
By Technology
By Services
By Audience
By Language
Displaying 61 - 90 of 621
Security Roundtable Article
‘Poor Cyber Hygiene’: Three Dirty Words for Online Retailers
Breakdowns in routine cyber hygiene have resulted in several recent security breaches at online retailers. CISOs, CIOs, and …
Erin Nealy Cox,
Security Roundtable Article
Can You Talk the Talk? Cloud Jargon 101 for Executives
Years ago, I was watching The Masters golf tournament on TV and I encountered something unexpected: IBM was …
Mike Perkowski,
Security Roundtable Article
Managing Cybersecurity in a Time of Pandemic
This is the first article in a series hosted by Security Roundtable and powered by Palo Alto Networks …
John Davis,
Security Roundtable Article
Security Without Boundaries: The Perimeter is Dead
Cloud computing, mobility, and the Internet of Things (IoT) have dramatically changed business. These technologies have introduced a level of innovation and disruption that would have been unimaginable only a few years ago. However, there’s a downside to all of the connectivity: It has significantly ratcheted up cybersecurity risks. Said Paul Calatayud, chief security officer, Americas, for Palo Alto Networks:...
Sam Greengard,
Security Roundtable Article
The Perimeter Is Dead: Security Without Boundaries
Cloud computing, mobility, and the Internet of Things (IoT) have dramatically changed business. These technologies have introduced a …
Sam Greengard,
Security Roundtable Article
IoT Security Best Practices
It’s no secret that IoT security is a problem. That’s why there are so many regulations and initiatives aimed …
Security Roundtable Article
Researchers Discover Two Major Flaws in the World’s Computers
SAN FRANCISCO — Computer security experts have discovered two major security flaws in the microprocessors inside nearly all …
Security Roundtable Article
How CISOs Can Successfully Talk Security to CEOs
It would be funny, if it were not so frustrating, that two individuals so intent on risk management …
Security Roundtable Article
Education Faces a Learning Curve for IoT Cybersecurity
Over the last few years, the Internet of Things (IoT) has morphed from a futuristic concept to a …
David M. Furr,
Security Roundtable Article
Quick Take-Aways from the RSA Security Conference
Last week’s RSA Security Conference had good discussions and industry focus, but there was too much hype — and there’s lots of work ahead.
Security Roundtable Article
Why a Zero-Trust Approach Can Make the Cloud More Secure
There are several widely accepted truths about public-cloud services of varying levels of veracity—that they are cheaper, more flexible, and can be more quickly deployed. Perhaps none is more dangerous, however, than the assumption that the cloud is, by nature, more secure. Just last year: Four million customers of a U.S. cable provider were exposed to the Internet after a...
James Staten, John Kindervag,
Security Roundtable Article
Why a Zero-Trust Approach Can Make the Cloud More Secure
There are several widely accepted truths about public-cloud services of varying levels of veracity—that they are cheaper, more …
James Staten, John Kindervag,
Security Roundtable Article
Authentication Grows Up
Which forms of multi-factor authentication (MFA) are working, which are not, and where industry watchers think the market …
Security Roundtable Article
How to Create a Next Generation SOC
In the first installment of this two-part series, I detailed ways to build an effective security operations center …
Haider Pasha,
Security Roundtable Article
Aligning Cybersecurity With Business Goals: 5 Steps to Success
Cybersecurity oversight can be unsettling for C-suite executives and board members. The connection between the board room and those managing technical infrastructure is critical, yet C-suite executives or board members typically don’t have the skills or knowledge of the threat landscape or technologies involved in cybersecurity programs to flatten the management structure enough for top-to-bottom direct management. For the foreseeable...
Larry Jones,
Security Roundtable Article
Aligning Cybersecurity With Business Goals: Five Steps to Success
Cybersecurity oversight can be unsettling for C-suite executives and board members. The connection between the board room and those managing technical infrastructure is critical, yet C-suite executives or board members typically don’t have the skills or knowledge of the threat landscape or technologies involved in cybersecurity programs to flatten the management structure enough for top-to-bottom direct management. For the foreseeable...
Larry Jones,
Security Roundtable Article
When a Breach Hits, the Best Defense Is a Good Offense
Organizations spend a lot of time, resources, and money on avoiding data breaches. Some organizations even go as …
Paul Calatayud,
Security Roundtable Article
Blockchain Is Going Mainstream, Redefining Cybersecurity
In recent months, the hype and hoopla over cryptocurrencies such as Bitcoin have reached a fevered pitch. Speculators …
Sam Greengard,
Security Roundtable Article
Cybersecurity is Not an IT Issue, It’s a Business Issue
Security Roundtable recently had the opportunity to talk with Zulfikar Ramzan, PhD, CTO, at RSA, after his keynote “AI: Boon Or Boondoggle?” at the recent SXSW event, in Austin. You can watch the session on demand and read along with his slides. Ramzan’s message to CMOs is to engage your CISO and your C-suite if you haven’t done so already...
Steven Cook,
Security Roundtable Article
Cybersecurity is Not an IT Issue, It’s a Business Issue
Security Roundtable recently had the opportunity to talk with Zulfikar Ramzan, PhD, CTO, at RSA, after his keynote …
Steven Cook,
Security Roundtable Article
3 Steps to Improving Cybercrime Prevention
Cybercrime is a huge industry—in fact, it is one of the fastest growing industries in the world. By some estimates, cybercrime damages will cost the world $6 trillion annually by 2021, up from $3 trillion just a year ago. And, as in any industry, opportunity fuels more investment and innovation. The best way to get an industry to collapse...
Security Roundtable Staff,
Security Roundtable Article
Three Steps for Limiting Cyberattack Risk
Cybercrime is a huge industry—in fact, it is one of the fastest growing industries in the world. By …
Security Roundtable Staff,
Security Roundtable Article
The Dog Days Of Cybersecurity Are Over
I’ve been the red-headed step child for most of my career. Sure, I’ve had my fair share of …
Security Roundtable Article
Cybersecurity Lessons for 2020 and Beyond
Good cybersecurity has tremendous potential to improve society, business and services we use every day. Because of its …
Security Roundtable Article
Blockchain For Beginners: Year of Hype, Year of Promise
The speaker took the stage in front of an audience of marketing professionals and pulled up a slide …
Mercedes Cardona,
Security Roundtable Article
The Ransomware Plague Is Just Beginning
It’s not exactly a no-brainer, but the success of ransomware in 2017 leads us to a logical prediction …
Security Roundtable Article
Security Spending to Hit $96B in 2018: Where are CXOs Investing?
Massive cyberattacks and data breaches are driving companies worldwide to increase cybersecurity spending to $96 billion in 2018—up …
Security Roundtable Article
What Retailers Should Be Thinking About and Planning For
This post is part of an ongoing blog series examining predictions and recommendations for retail cybersecurity in 2018. …
Security Roundtable Article
Prioritizing Cybersecurity Could Be What the NHS Needs
In May 2017, the U.K.’s National Health System (NHS) realized it needed to improve security measures—not only for …
Security Roundtable Staff,
Security Roundtable Article
Responding to the Rise of Fileless Attacks
Fileless attacks, easier to conduct and more effective than traditional malware-based threats, pose a growing challenge to enterprise …
Displaying 61 - 90 of 621