The latest Growth Swarm podcast covers cybersecurity as a business enabler from the CEO perspective, the CMO perspective, and the industry perspective.
Search Results: phishing (74)
Knowledge is power, and in the world of cybersecurity, the threat intelligence lifecycle is key to unlocking that power.
Cybersecurity data can empower C-suite executives to make informed decisions, protect their organization, and drive business growth.
Day 3 of Acceleration Economy’s Digital CIO Summit included a CISO panel, discussions around cybersecurity, digital natives, and co-creation.
Bill Doerrfeld recomienda algunas buenas prácticas de usar Inteligencia Artificial aplicada a la detección automatizada de vulnerabilidades en finanzas.
Metrics are a critical part of implementing zero trust.
New data from Palo Alto Networks’ incident response team highlights the expanding set of extortion tactics being used as part of ransomware attacks.
Environmental, social, and governance frameworks are on the rise, and they must be crafted with enough security considerations to ward off increased cyber threats.
Frank Domizio explora el uso de Inteligencia Artificial en un entorno dinámico de ciberseguridad, sus beneficios y retos.
An in-depth look at automated vulnerability scanning within financial software, how it works, as well as top tools and best practices to get the job done.
Effective zero trust requires a comprehensive understanding of the organization’s security landscape, a risk-based approach, and a commitment to continuous improvement. Learn how to manage the journey.
The zero trust security framework can protect sensitive data from evolving cyber threats, says Frank Domizio.
Frank Domizio explains why cybersecurity professionals must continuously be on the lookout for ways in which the zero trust security model could become vulnerable to ever-evolving attackers.
Analyst and CISO Frank Domizio lays out how the accelerating use of artificial intelligence (AI) in cybersecurity can ultimately improve a company’s security posture.
CISO Frank Domizio looks at common security vulnerabilities in the retail industry and offers practical ways to mitigate them and boost resilience.
Kieron Allen profiles Top 10 Cybersecurity company Lookout, whose platform provides endpoint security for everything from mobile devices to data stored in the cloud.
La tecnología ChatGPT no es ni buena ni mala, el uso que se le dé dependerá de la intención última del usuario.
CIOs and CISOs must learn to communicate openly to have the types of strong relationships that lead to healthy, successful companies. In this analysis, Kenny Mullican gives tips on how they can achieve them.
Workday has a new co-CEO, who will be sole CEO in a year. Bob Evans shares insights into the new leader’s character.
Kieron Allen explores how the Toucan platform’s decentralized technology and tokenization methods help companies offset carbon.