By Topic
By Industry
By Product Category
By Features
By Technology
By Services
By Audience
By Language
Displaying 91 - 120 of 621
Security Roundtable Article
CISO: Desk Reference Guide; A Practical Guide for CISOs Volume 2
Originally published on the Palo Alto Networks Blog by Rick Howard. We modeled the Cybersecurity Canon after the Baseball or Rock & Roll Hall-of-Fame, except for cybersecurity books. We have more than 25 books on the initial candidate list, but we are soliciting help from the cybersecurity community to increase the number to be much more than that. Please write a review and...
Security Roundtable Article
Machine Learning Takes on Data Classification and Security
The traditional way to approach data security often involves blunt force. Malek Ben Salem, Senior Principal at Accenture Labs, argues that organizations must adopt a more sophisticated and nuanced approach to managing data. Amidst a growing stream of documents, it’s critical to adopt a classification scheme. Accenture is addressing this challenge with software and systems designed to improve data protections...
Sam Greengard,
Security Roundtable Article
CISO: Desk Reference Guide; A Practical Guide for CISOs Volume 2
Originally published on the Palo Alto Networks Blog by Rick Howard. We modeled the Cybersecurity Canon after the Baseball or …
Security Roundtable Staff,
Security Roundtable Article
Machine Learning Takes on Data Classification and Security
The traditional way to approach data security often involves blunt force. Malek Ben Salem, Senior Principal at Accenture …
Sam Greengard,
Security Roundtable Article
Getting Smart About Employee Monitoring
Protecting enterprise assets has never been tougher. Despite sophisticated tools and technologies to guard data, organizations increasingly find …
Sam Greengard,
Security Roundtable Article
How AI Can Help Stop Cyberattacks
As corporations struggle to fight off hackers and contain data breaches, some are looking to artificial intelligence for …
Security Roundtable Article
Watch Your Language: In Cybersecurity, What You Say and How You Say it Matters a Lot
People have studied the impact and importance of language for centuries–and for good reason. Nothing in life is …
Mike Perkowski,
Security Roundtable Article
Blockchain Offers Great Potential–If You Focus on the Right Use Cases
There are few technologies with as much potential to revolutionize how organizations conduct business as blockchain. The ability …
Ryan Fay,
Security Roundtable Article
A CEO’s 5 Golden Rules in Managing a Cybersecurity Crisis
“In business, we plan for success. In cybersecurity we have to plan for failure,” a Fortune 500 executive …
Sergej Epp,
Security Roundtable Article
NotPetya’s Hard Lessons on Cybersecurity and SCADA
Tuesday, June 27, 2017, a morning like any other in Kyiv, hometown of Linkos Group. It’s a small …
Sergej Epp,
Security Roundtable Article
China has Unveiled the World’s First ‘Unhackable Computer Network’
China has successfully tested the Jinan Project, and is set to begin using the system by the end …
Security Roundtable Article
What You’re Doing to Protect Your Data Isn’t Working
You just clicked on the link in an email from your cousin. Or, at least you thought it came from …
Security Roundtable Article
Is It Time to Rethink Cybersecurity Value?
During Facebook’s recent earnings call, CEO Mark Zuckerberg informed investors that profitability would be impacted because of significant …
Paul Calatayud,
Security Roundtable Article
‘Tried and True’ Network Segmentation Can Come to the Rescue
Corporate networks are key to modern business. In fact, the enterprise risks associated with cyber breaches—financial, operational, and …
Security Roundtable Staff,
Security Roundtable Article
Know Your Cyber Attacks: Five Common Exploits
When two major security flaws located in the microprocessors driving most of the world’s computers became public earlier …
Stephanie Overby,
Security Roundtable Article
Manufacturing a Better IIoT Security Strategy
The Industrial Internet of Things (IIoT) has introduced both opportunities and challenges for organizations. Equipping machines with sensors …
David M. Furr,
Security Roundtable Article
Privacy vs. Security: Tips for Executives Implementing a BYOD Policy
Bring Your Own Device (BYOD) is an inevitable trend among businesses. Over 80% of enterprises now allow employees to use …
Elena Kvochko,
Security Roundtable Article
Unlocking Productivity With Security
Mobile working has changed how organizations conduct business, from the development labs and the factory floor of the …
Siân John,
Security Roundtable Article
Phishing Isn’t Going Away—Here’s How to Not Fall Prey
Phishing attacks remain in the news. ZDNet reported last week that a prolific phishing operation—which already had a …
Sean Duca,
Security Roundtable Article
The 5 Most Important Questions to Ask Your Security Team
CEOs and board members don’t need to be experts on cybersecurity, but they do need to be armed …
Davis Hake,
Security Roundtable Article
Board Members: Don’t Give Cybercriminals a Seat at the Table
If you are on the board of directors of any company in any industry, you have a duty to understand what company leadership is doing to mitigate cyber-security risk. But with that comes the responsibility to secure the information you are entrusted with to ensure you aren’t the weakest link into the organization. Make no mistake: Board members are a...
Sean Duca,
Security Roundtable Article
Building a Cybersecurity Program: Who’s Responsible for What?
The nature of the cyber-threat landscape is evolving quickly, while the underlying technology platforms that hold sensitive data are also changing. In this fluid environment, management teams must create a nimble program from active cyber defenses informed by an iterative risk-management process. Unlike other enterprise risks that can be managed with traditional controls, cybersecurity requires the mindset of a...
Larry Jones,
Security Roundtable Article
Cybersecurity Leadership Role A Sweet Spot for the CISO
Cybersecurity has traditionally been a subject only a few executives were expected to understand. However, as additional security …
Shinichi Yokohama,
Security Roundtable Article
Does Your Cyber Defense Strategy Pay Heed to Patterns?
As a CISO, I have participated in many discussions about breaches. We do our best to understand who …
Paul Calatayud,
Security Roundtable Article
Cybersecurity is About Risk Management, Not Risk Elimination
Get your copy of Navigating the Digital Age here.
Michael Chertoff,
Security Roundtable Article
It Was Good News-Bad News for Breaches In 2017
U.S. business experienced a good news-bad news scenario when dealing with cybersecurity in 2017. Increased mobile use and …
Mercedes Cardona,
Security Roundtable Article
Apparently a Way of Hacking ATMs Called ‘Jackpotting’ Has Spread to the US
ATM manufacturers are warning that criminals are hacking into their devices using a method called “jackpotting”that has recently …
Security Roundtable Article
Think You Have the Right Cybersecurity Culture? Think Again
15 years ago, the U.S. government designated October as “National Cybersecurity Awareness Month.” As the name implies, the …
Mike Perkowski,
Security Roundtable Article
It’s Time for a Change to Cybersecurity Consumption
Widespread adoption of the cloud has made business executives and board members comfortable with the idea of paying for IT resources and services “by the glass.” Moving to such a consumption model offers widely accepted financial and operational benefits that promote agility, scalability, and digital transformation. Leading cloud service providers such as Amazon Web Services (AWS), Microsoft, and Google all...
Greg Day,
Security Roundtable Article
It’s Time for a Change to Cybersecurity Consumption
Widespread adoption of the cloud has made business executives and board members comfortable with the idea of paying …
Greg Day,
Displaying 91 - 120 of 621