Endpoint security tools like Palo Alto Networks’ Cortex protect organizations from cyber threats and are especially necessary in the era of remote work.
security
Security leaders should have conversations with key personnel in HR, finance, and sales/marketing to ensure alignment between security and business goals.
These two complementary cybersecurity practices, when combined, enable organizations to quickly and effectively identify and mitigate potential cyber threats.
Janet Schijns discusses the power of strategic partnerships to navigate challenges, unlock opportunities, and achieve sustainable growth in the digital economy.
A briefing featuring three CISO Practitioner Analysts discussing the state of the market, CISO priorities, Multi-Cloud Cybersecurity, SaaS Security, and the impact of Generative AI.
In a survey of 1,600 business and tech leaders, Rubrik finds high levels of concern about cybersecurity preparedness, and reveals the extent of ransomware demands.
Fortinet has become a member in the Joint Cyber Defense Collaborative, contributing its threat intelligence research to strengthen U.S. cyber resilience.
Cloudera details its SDX design philosophy which embeds security and governance in every product and platform by default.
Tactical threat intelligence is gathering, analyzing, and sharing data to find cyber threats and figure out how to deal with them. Learn how to set up a program.
There are challenges and opportunities when it comes to organizational change management, says Gorilla Glues’ Cedric Wells, who zeroes in on how digital transformation benefits digital natives.
The latest Growth Swarm podcast covers cybersecurity as a business enabler from the CEO perspective, the CMO perspective, and the industry perspective.
The release of Microsoft’s Security Copilot is only the beginning of generative AI use cases for cybersecurity tooling, says Chris Hughes.
Chris Hughes explains what this synergy means for businesses as they continue to move to the cloud and accumulate data to drive business decisions and outcomes.
As a business leader today, your success relies on accurate data, real-time analytics, and actionable intelligence. Here are the tools to help you.
Rob Wood explains how organizations can avoid complications from compliance and other requirements in financial automation projects.
In a statement, Lookout exec explains the data collection practices of TikTok and other mobile apps, cites need for awareness of mobile apps’ risk.
With its low-code platform, Appian empowers customers to build applications that automate key business functions. It’s prepared to guarantee their success.
MITRE’s new System of Trust risk model manager and a community engagement group introduces another great resource for software supply chain security and risk management.
Multi-cloud computing allows organizations to tailor their cloud strategies, reduce costs, and avoid vendor lock-in, but it also brings unique cybersecurity challenges.
Our Securing Multi-Cloud Ecosystems guidebook is a comprehensive resource demonstrating the why & how of secure multi-cloud computing.
Strong relationships between the CISO, the chief data officer, and the others involved with data will strengthen an organization’s data strategy, says Rob Wood.