Fear, uncertainty, and doubt (FUD) surround AI in cybersecurity, and practitioners need to have proactive conversations to combat it.
Generative AI’s rapid rise makes it imperative for security teams to establish policy frameworks and guardrails in order to mitigate risk.
ChatGPT may be getting a lot of attention, but generative AI-powered deepfakes have been around for a while, and security teams can’t forget this riskier side of the technology, says Rob Wood.
Security teams can assist with financial automation projects that often require third-party tools. Rob Wood has some tips on how to select them.
If security professionals are going to position themselves as enablers to the business, then they must invest in the CISO-CFO relationship.
Frameworks like those from ISO and NIST help with data governance, says Rob Wood, recommending how to choose and implement a framework.
Grip Security addresses the challenges of SaaS security by providing tailored insights and an agentless deployment mechanism among other advantages.
There are many benefits to using the zero trust maturity model as a framework for cybersecurity planning and implementation, say Rob Wood.
Strong relationships between the CISO, the chief data officer, and the others involved with data will strengthen an organization’s data strategy, says Rob Wood.
Rob Wood explains why security teams need to be trained to assess risk and maintain compliance across different clouds.
Frank Domizio explains why cybersecurity professionals must continuously be on the lookout for ways in which the zero trust security model could become vulnerable to ever-evolving attackers.
Transitioning to multi-cloud will be a challenge if no one on your security team has experience with the technology, says Rob Wood.
Insights from data-driven teams include application telemetry and debugging logs, which can be invaluable from a security standpoint.
Frank Domizio explains how partnering with a CISO can provide expertise, tools, and support to ensure that sensitive data remains secure.
Artificial intelligence is now a front-line tool in combating cyber threats and delivering data-driven insights. AI expert and Acceleration Economy Practitioner Analyst, Ronak Mathur explores the capabilities of AI to bolster cybersecurity measures.
Frank shares a few essential ways to get the right people, set the ground rules, and stay informed so you can successfully navigate your breach response.
After a breach, you’ll need help from an incident response team, either in-house or third party. Frank explains how and what to look for.
Robert explains why communication is key to getting security, legal, sales, and engineering teams on board with a DevSecOps strategy shift.
Threat hunting is often thought of as something one does to uncover as yet undetected threats in an organization. But there’s also attack-specific threat hunting, which, analyst Chris Hughes explains, is essential when responding to security breaches.
The first article in a series on the top 10 things to do if you’ve been breached discusses RACI (responsible, accountable, consulted, informed), a framework for defining roles and responsibilities in projects or processes.