Gartner Top Security Projects for 2020-2021

CEB IT

“Are you trying to ensure security for your remote workforce but don’t want to hinder business productivity?” ” “Are you struggling with identifying risks and gaps in security capabilities?” 1: Securing your remote workforce. Security

Fugue Cloud Security Adds Support for Container Runtimes

CTOvision

Fugue today announced it has extended its eponymous platform for securing cloud environments to include container runtime environments. News Fugue Fugue Cloud Security

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Is the Cloud Secure?

CEB IT

Cloud security breaches consistently make news headlines. The ambiguity that surrounds cloud computing can make securing the enterprise seem daunting. Concerns about security have led some CIOs to limit their organizational use of public cloud services. However, the challenge exists not in the security of the cloud itself, but in the policies and technologies for security and control of the technology. to “Am I using the cloud securely?”

Interview: Tom Davison, Technical Director EMEA, Lookout Mobile Security

CTOvision

According to recent statistics from Lookout Mobile Security, drawing on analysis of nearly 200 million mobile devices running Lookout’s security software, as many as 50% of Android users globally are […]. News Lookout Lookout Mobile Security

Mobile 240

How to Measure DevSecOps Progress and Ensure Success

Speaker: Shannon Lietz, Director of DevSecOps Team, Intuit

The new DevSecOps team is up and running, and you feel ready to take on rising security threats while delivering quality software updates. But that leaves just one question: how do you monitor your new program as effectively and efficiently as possible? Join Shannon Lietz, Director of DevsecOps at Intuit, and award-winning innovator, to learn the answers to these questions so you can lead your DevSecOps team to the top!

Imperva’s Mobile Security App

CTOvision

Read Michael Wright take a look at Imperva’s mobile security App on Security Boulevard: How many apps do you currently have on your mobile device?

Mobile 240

Data security depends on a secure software-development supply chain

Venture Beast

Russia's SolarWinds hack gave it access to data from federal agencies because we haven't secured the software supply chain. Cloud Dev Enterprise Security VB Home Page category-/Computers & Electronics/Computer Security Open source SolarWinds supply-chain attack

Top Actions From Gartner Hype Cycle for Cloud Security, 2020

CEB IT

Organizations may no longer question its utility, but security remains a commonly cited reason for avoiding it. In reality, the public cloud can be made secure enough for most uses. Here are three technologies from the Gartner Hype Cycle for Cloud Security, 2020, to action right now.

Contact Center Security: Anomaly Detection and Fraud Prevention Best Practices

CTOvision

Read how Pindrop helps in the Contact Center security through anomaly detection and fraud prevention on their blog: Fraud costs don’t start in your finance department. News Pindrop Pindrop Security

Contrast Security

CTOvision

Contrast security seeks to usher in a new era of self-protecting software. From their website: Contrast Security is the world’s leading provider of security technology that enables software applications to protect themselves against cyberattacks. Only Contrast has intelligent agents that work actively inside applications to prevent data breaches, defeat hackers and secure the entire enterprise from development, to operations, to production. Research Team.

Assessing Enterprise Firmware Security Risk in 2021

CTOvision

In a year of historic challenges, 2020 saw firmware and hardware issues become one of the most active areas of enterprise security. APT and ransomware threat actors targeted enterprise VPNs […]. News Eclypsium

Building Like Amazon

Speaker: Leo Zhadanovsky, Principal Solutions Architect, Amazon Web Services

Amazon's journey to its current modern architecture and processes provides insights for all software development leaders. To get there, Amazon focused on decomposing for agility, making critical cultural and operational changes, and creating tools for software delivery. The result was enabling developers to rapidly release and iterate software while maintaining industry-leading standards on security, reliability, and performance. Whether you're developing for a small startup or a large corporation, learning the tools for CI/CD will make your good DevOps team great. We are excited to be joined by Leo Zhadanovsky, a Principal Solutions Architect at Amazon Web Services.

Cloud Security Spending Will Grow To $3.5 Billion By 2021

Forrester IT

What does this mean for cloud security? · This rapid shift to the cloud raises new issues and challenges for security and risk professionals. Traditional perimeter-based security tools do little to protect cloud workloads. Securing data and applications that reside in the cloud is increasingly critical as more mission-critical apps and high-value data and intellectual property move to the cloud. Cloud Security. cloud access security brokers.

Clark-Wilson Security Model

Doctor Chaos

The Clark-Wilson security model is based on preserving information integrity against the malicious attempt of tampering with data. A security system in which transactions are well-formed ensures that only legitimate actions can be executed.

Helpful: Top 5 SIEM trends of 2021 and how Elastic Security solves them

CTOvision

Read Haran Kumar take a look at top Security information and event management (SIEM) system and how Elastic Security solves them on Elastic Blog : Security information and event management […].

Trends 254

Most enterprises struggle with IoT security incidents

CTOvision

According to new data released by Cybersecurity Insiders, 72% of organizations experienced an increase in endpoint and IoT security incidents in the last year, while 56% anticipate their organization will […].

SASE-ready Architecture with Netskope Security Cloud and Your Existing Security Infrastructure

CTOvision

With the inversion of the traditional network, where users, data, and apps are now on the outside, traditional approaches to security fall short. At most enterprise organizations, the cyber security […].

Data Analytics in the Cloud for Developers and Founders

Speaker: Javier Ramírez, Senior AWS Developer Advocate, AWS

You have lots of data, and you are probably thinking of using the cloud to analyze it. But how will you move data into the cloud? In which format? How will you validate and prepare the data? What about streaming data? Can data scientists discover and use the data? Can business people create reports via drag and drop? Can operations monitor what’s going on? Will the data lake scale when you have twice as much data? Is your data secure? In this session, we address common pitfalls of building data lakes and show how AWS can help you manage data and analytics more efficiently.

Securing SAP SuccessFactors – Protecting Human Capital

CTOvision

Read Matt Hines explain how CipherCloud offerings protect cloud applications on Security Boulevard : It goes without saying that your own organization’s most strategic cloud application is the most important […].

SAP 254

Fix your cloud security

David Linthicum

I found some interesting statistics in this RedLock article that illustrate the severity of the cloud security problem: Only 7 percent of businesses have good visibility of all critical data, and 58 percent say they only have slight visibility. More than three-fourths of security breaches (80%) involve privileged credentials.

Set Up a Budget-Friendly Application Security Program

CEB IT

In May 2020, a smartphone caller identification app reported a security breach in which the personal data of more than 47.5 In contrast to common perception, app security testing doesn’t always have to be a heavy investment. Security

Budget 251

What's New in IT Security?

Information Week

With new security threats continuously emerging, what can organizations do to harden their security and to better protect themselves from network intrusions and avoid damage

Shift Left Security? Development Does Not Want to Own It.

Speaker: Shlomo Bielak, CTO, Benchmark Corp

Shifting security left to the earliest part of development is currently in the spotlight in the developer world. What teams are now discovering is, this approach results in misdirected ownership for developers and a frustrated security team. In the current climate, we cannot afford to let security implementations falter. It's time to manage your team's energies to maximize DevOps efficiency, all the while maintaining top security standards. Join Shlomo Bielak, and learn how to keep your DevSecOps team focused and connected without creating silos.

Elevate Security Unveils New Research Shedding Light on Characteristics of Employees Most and Least Likely to Cause the Next Security Incident

CTOvision

Elevate Security, the first human risk management platform of its kind, released the “Global Employee Risk Insights Report.” News Elevate Elevate SecurityThis groundbreaking research is the industry’s first global research report on employee […].

IoT Security and Physical Safety

CTOvision

Read take a look at the Internet of Things security and physical security and how they are interconnected on IoT For All: Today, we rely on IoT devices more than […].

API Security in Action With the ForgeRock Identity Platform

CTOvision

One of the core security controls in API Security in Action is the use of rate-limiting to protect against distributed denial-of-service (DDoS) attacks.

Gartner Top 9 Security and Risk Trends for 2020

CEB IT

The shortage of technical security staff, the rapid migration to cloud computing, regulatory compliance requirements and the unrelenting evolution of threats continue to be the most significant ongoing major security challenges. However, responding to COVID-19 remains the biggest challenge for most security organizations in 2020. The primary goals of an XDR solution are to increase detection accuracy and improve security operations efficiency and productivity.

Trends 239

The Product Dev Conundrum: To Build or Buy in a Digital World?

Speaker: Mark Ridley, Owner and Founder, Ridley Industries

Any PM or technical leader who’s led the charge of building a digital product knows that product engineering is one of the most expensive elements of business. In most cases, actually building software should be the last avenue that companies explore to deliver great products, as software engineering, data science and product development are complex, uncertain and hard to manage.

The Security Yearbook by Richard Stiennon

CTOvision

I am so excited to now have an autographed copy of The Security Yearbook by Richard Stiennon. Cyber Security News BooksRichard is a prolific writer, a fantastic speaker, and is known the world over as perhaps the most savvy of all analysts in the cybersecurity field. Many of us have learned from him over the years, but his […].

IoT Security: Don’t Sacrifice Data for Usability

CTOvision

Read why Christos Kalantzis says that organizations should not sacrifice data for the usability of the Internet of Things on Security Boulevard: Over the last decade, we’ve seen truly innovative […].

The Problem with Artificial Intelligence in Security

CTOvision

Read Dr. Leila Powell take a look at the security issues associated with artificial intelligence on Dark Reading: If you believed everything you read, artificial intelligence (AI) is the savior […].

5 Questions to Cut Through the AI Security Hype

CEB IT

For security leaders, the reality is that current AI technology, including machine learning (ML) techniques, can augment security capabilities. In the area of anomaly detection and security analytics, humans working with AI accomplish much more than without it. Security

Three Essential Mobile Security Measures

CTOvision

Read Andrew Hoog explain the three essential mobile security measures every company should adopt on DZone Blog : Many of us have heard of the 80/20 rule, also known as the ‘Pareto Principle.’ Applied to mobile application security, the idea is that guarding against threats with the greatest potential impact can mitigate 80 percent of […]. Cyber Security News

Mobile 210

Palo Alto Networks Takes On 5G Security With New Offerings

CTOvision

Palo Alto Networks has rolled out a series of as-a-service offerings to help service providers and enterprises secure 5G networks, services, applications and devices. based platform security vendor […].

Transmit Security launches BindID to replace passwords with biometric authentication

Venture Beast

With BindID, Transmit Security is launching a product that helps businesses embrace online biometric authentication. Cloud Entrepreneur Security VB Home Page category-/Computers & Electronics/Computer Security passwordless Transmit Security

The 15-Minute, 7-Slide Security Presentation for Your Board of Directors

CEB IT

When the request comes in to give a cybersecurity presentation to the board, security leaders should jump at the chance to educate the executives. Security and risk leaders will be presenting to the board at least on an annual basis, with some on a more frequent rotation. . Board members will have many questions about the organization's security strategy during this unprecedented event. . Read more: 5 Security Questions Your Board Will Inevitably Ask.

Cloud Security Alliance DC Update: Explore The Boundary of Security & Privacy on 13 June Cruise

CTOvision

The Boundary of Security & Privacy Privacy is becoming an ever increasing concern in our world today. Social Networks today are now focusing on users’ privacy given the inherent security risks posed by organizations’ access to personally identifiable information. Cloud Computing Cyber Security NewsThe European Union has enacted GDPR valuing privacy whereas on the opposite end of the spectrum, […].

Maximizing data privacy: Making sensitive data secure by default

CTOvision

Read Ayal Yogev explain how companies can maximize data security by making sensitive data secure by default on Help Net Security : Consider the case of contact tracing, which has […].

.Net 287

A Security Perspective Post-COVID-19

CTOvision

I look forward to discussing the topic of the continuing complex dynamics around cybersecurity in this 11 November online panel hosted by ISRM and TinyG. Please join us and help […]. CTO Events OODA

Cyber Security in Aviation

CTOvision

Whether or not Roberts’ claims were true or whether or not his intentions were malicious, he brought to light the significant need to readdress aviation cyber security. During the 2015 Global Connected Aircraft Summit , a session was dedicated to the topic of aviation cyber security: “Cyber Security: How Can a Connected Aircraft Manage This Threat?” The increase of technology does not match the increase in technology security.

5 Strategic Cost Optimization Action Items for Security Leaders

CEB IT

Eighty-two percent of security and risk leaders do not adjust their budgets based on environmental or business impact, which means they operate in a silo and are not aligned with the business. Read more: Gartner Top 10 Security Projects for 2020-2021. Security

The Growing Importance Of Cyber Security Skills

CTOvision

As data breaches have become the order of the day, Adi Gaskell explains the growing importance of having cyber security talent in your company on Forbes : Cybercrime costs the UK several billion pounds per year. CTO Cyber Security News Training and EducationIndeed, a recent government report showed that 46% of all businesses identified at least one cyber attack in the last […].

Automation For The Better Good - Security

Forrester IT

What these tasks have in common (in addition to relying on automation): a critical dependence on security. In a world where infrastructure-as-code scales quickly and massively scales, it is crucial to bake in security at every level of the stack. Information Security. Security Operations & Program Governance. application security.