Chris Hughes explains what this synergy means for businesses as they continue to move to the cloud and accumulate data to drive business decisions and outcomes.
Search Results: cybersecurity (1376)
Knowledge is power, and in the world of cybersecurity, the threat intelligence lifecycle is key to unlocking that power.
Small- and medium-sized businesses can stay current on the latest threats and detect and prevent attacks with tailored threat intelligence data by leveraging open-source platforms, tools, and communities.
Security teams can assist with financial automation projects that often require third-party tools. Rob Wood has some tips on how to select them.
Cybersecurity data can empower C-suite executives to make informed decisions, protect their organization, and drive business growth.
Embracing digital transformation, cybersecurity, energy-efficent infrastructure, and relevant data and systems helps meet sustainability goals.
Day 3 of Acceleration Economy’s Digital CIO Summit included a CISO panel, discussions around cybersecurity, digital natives, and co-creation.
If security professionals are going to position themselves as enablers to the business, then they must invest in the CISO-CFO relationship.
The first day of the Digital CIO Summit was filled with first-person perspectives and practitioner-led sessions about the role of the CIO.
New data from Palo Alto Networks’ incident response team highlights the expanding set of extortion tactics being used as part of ransomware attacks.
Expert practitioner-analysts offer guidance on safeguarding critical data from cyberattacks, including prioritizing data types and preventing silos, as well as ways to protect against data leakage and ransomware.
Tony Uphoff makes a case for cybersecurity as a growth driver, and offers five ways that CEOs can capitalize on it today.
The Biden-Harris administration unveiled an updated National Cybersecurity Strategy to standardize cybersecurity practices across agencies and encourage market accountability.
There are many benefits to using the zero trust maturity model as a framework for cybersecurity planning and implementation, say Rob Wood.
In this Cloud Data Strategy moment, Chris Hughes defines the areas of focus security leaders must consider when safeguarding data in the cloud.
As sustainability becomes a key focus for businesses and critical infrastructure, organizations must also prioritize cybersecurity and secure data standards to safeguard emerging technologies like IoT and OT devices from evolving cyber threats.
New data from NetApp shows that even with the benefits of multi-cloud, this increasingly popular architecture introduces various forms of complexity for tech leaders.
Multi-cloud incident response is more complex than traditional incident response. Frank Domizio explains how and why organizations need to adapt.
Environmental, social, and governance frameworks are on the rise, and they must be crafted with enough security considerations to ward off increased cyber threats.
Contextualize what you need from data teams, so that they understand the why behind your ask, Rob Wood advises, as a way to build stronger relationships.