Robert Wood offers three ways that a positive culture can be created to attract and keep the right cybersecurity talent for your organization
Cloud data protection provider HYCU teams up with cloud storage provider Wasabi to deter ransomware attacks for customers at an affordable price point.
In Episode 44 of the CXO2 Minute, Wayne continues his examination of a CISO’s place within an organization and explains why boards are responsible for understanding all sides of technology.
In this Cloud Wars Expo Moment, Chris Hughes explains why bringing cybersecurity into the development workflow is key to empowering engineering teams with guardrails rather than gates.
In this Let’s Talk Data podcast, Quest Software’s Richard Rule explains why and how the LATAM region is “behind the curve” in data management.
In Episode 16 of Acceleration Economy’s Growth Swarm podcast, the panel addresses innovation, partnerships, and sustainability in the public sector.
With complex and distributed software ecosystems, organizations need to reach beyond traditional security measures through observability tools and practices.
In Episode 44 of the CXO2 Minute, Wayne discusses why CISOs don’t sit on the Board of Directors despite the growing importance of cybersecurity measures.
Lookout’s new CMO, Deb Wolf, explains how the security platform innovator with B2C roots can enable enterprise business outcomes.
As the open source ecosystem has evolved, the Software Bill of Materials (SBOM) has caused a shift in the security market.
In Cybersecurity Minute Episode 28, Chris Hughes discusses how malicious actors compromised more than 130 business organizations through poor two-factor authentication practices.
The Software Bill of Materials (SBOM) increases transparency and is expected to become an integral part of the software industry. Bill Doerrfeld explains why, and what organizations must do about it.
In this Cloud Wars Expo Moment, excerpted from the “Removing Security Friction” education session, Chris Hughes explains how businesses must balance strict security protocols with making user data easily accessible to the proper parties.
In Cybersecurity Minute Episode 27, Chris Hughes reacts to major allegations against Twitter’s security policies, including potential interference from foreign agencies.
CISO and Acceleration Economy Analyst Rob Wood explores the cloud compliance approaches about which he is most excited.
In Cybersecurity Minute, Episode 26, Chris Hughes reacts to the recently discovered attack on cloned version of GitHub repositories carrying malicious code.
In this Cloud Wars Expo Moment, Mazars Director of Technology Enablement Paul Nauroth corrects the notion that the pandemic was the sole cause for WFA program development. The pandemic merely catalyzed a growing desire for work flexibility.
Automation is not always simple to implement in application security (AppSec), but it’s critical, as Chris Hughes explains.
Pablo Moreno explains the different states of data, and the best strategies for securing each one.
In Cybersecurity Minute, Ep. 25, Chris reacts to a recently-discovered bug within the Slack platform compromising user passwords since 2017.