Gartner Top Security Projects for 2020-2021

CEB IT

“Are you trying to ensure security for your remote workforce but don’t want to hinder business productivity?” ” “Are you struggling with identifying risks and gaps in security capabilities?” 1: Securing your remote workforce. Security

Contact Center Security: Anomaly Detection and Fraud Prevention Best Practices

CTOvision

Read how Pindrop helps in the Contact Center security through anomaly detection and fraud prevention on their blog: Fraud costs don’t start in your finance department. News Pindrop Pindrop Security

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Imperva’s Mobile Security App

CTOvision

Read Michael Wright take a look at Imperva’s mobile security App on Security Boulevard: How many apps do you currently have on your mobile device?

Mobile 240

Is the Cloud Secure?

CEB IT

Cloud security breaches consistently make news headlines. The ambiguity that surrounds cloud computing can make securing the enterprise seem daunting. Concerns about security have led some CIOs to limit their organizational use of public cloud services. However, the challenge exists not in the security of the cloud itself, but in the policies and technologies for security and control of the technology. to “Am I using the cloud securely?”

Building Like Amazon

Speaker: Leo Zhadanovsky, Principal Solutions Architect, Amazon Web Services

Amazon's journey to its current modern architecture and processes provides insights for all software development leaders. To get there, Amazon focused on decomposing for agility, making critical cultural and operational changes, and creating tools for software delivery. The result was enabling developers to rapidly release and iterate software while maintaining industry-leading standards on security, reliability, and performance. Whether you're developing for a small startup or a large corporation, learning the tools for CI/CD will make your good DevOps team great. We are excited to be joined by Leo Zhadanovsky, a Principal Solutions Architect at Amazon Web Services.

Top Actions From Gartner Hype Cycle for Cloud Security, 2020

CEB IT

Organizations may no longer question its utility, but security remains a commonly cited reason for avoiding it. In reality, the public cloud can be made secure enough for most uses. Here are three technologies from the Gartner Hype Cycle for Cloud Security, 2020, to action right now.

Most enterprises struggle with IoT security incidents

CTOvision

According to new data released by Cybersecurity Insiders, 72% of organizations experienced an increase in endpoint and IoT security incidents in the last year, while 56% anticipate their organization will […].

IoT Security and Physical Safety

CTOvision

Read take a look at the Internet of Things security and physical security and how they are interconnected on IoT For All: Today, we rely on IoT devices more than […].

IoT Security: Don’t Sacrifice Data for Usability

CTOvision

Read why Christos Kalantzis says that organizations should not sacrifice data for the usability of the Internet of Things on Security Boulevard: Over the last decade, we’ve seen truly innovative […].

A Security Perspective Post-COVID-19

CTOvision

I look forward to discussing the topic of the continuing complex dynamics around cybersecurity in this 11 November online panel hosted by ISRM and TinyG. Please join us and help […]. CTO Events OODA

Cloud Security Spending Will Grow To $3.5 Billion By 2021

Forrester IT

What does this mean for cloud security? · This rapid shift to the cloud raises new issues and challenges for security and risk professionals. Traditional perimeter-based security tools do little to protect cloud workloads. Securing data and applications that reside in the cloud is increasingly critical as more mission-critical apps and high-value data and intellectual property move to the cloud. Cloud Security. cloud access security brokers.

Data Analytics in the Cloud for Developers and Founders

Speaker: Javier Ramírez, Senior AWS Developer Advocate, AWS

You have lots of data, and you are probably thinking of using the cloud to analyze it. But how will you move data into the cloud? In which format? How will you validate and prepare the data? What about streaming data? Can data scientists discover and use the data? Can business people create reports via drag and drop? Can operations monitor what’s going on? Will the data lake scale when you have twice as much data? Is your data secure? In this session, we address common pitfalls of building data lakes and show how AWS can help you manage data and analytics more efficiently.

How Ubiq Security uses APIs to simplify data protection

Venture Beast

Ubiq Security raised a $6.4 Big Data Business Cloud Dev Enterprise Security APIs category-/Computers & Electronics/Computer Security data Ubiqmillion seed round to develop APIs that simplify the task of building encryption into applications. Read More.

TNS Taps Fortinet’s Secure SD-WAN Solution

CTOvision

Transaction Network Services (TNS), a leader in fintech payment services, recently announced the launch of TNS Secure SD-WAN which leverages Fortinet’s leading Secure SD-WAN solution. In partnership with Fortinet, TNS Secure […].

WAN 240

Set Up a Budget-Friendly Application Security Program

CEB IT

In May 2020, a smartphone caller identification app reported a security breach in which the personal data of more than 47.5 In contrast to common perception, app security testing doesn’t always have to be a heavy investment. Security

Budget 248

5 steps to secure your connected devices

CTOvision

Read Amer Owaida list five steps in which you can secure your Internet of Things connected devices on As we aim to make our lives simpler to manage, especially in […].

5 Questions to Cut Through the AI Security Hype

CEB IT

For security leaders, the reality is that current AI technology, including machine learning (ML) techniques, can augment security capabilities. In the area of anomaly detection and security analytics, humans working with AI accomplish much more than without it. Security

Shift Left Security? Development Does Not Want to Own It.

Speaker: Shlomo Bielak, CTO, Benchmark Corp

Shifting security left to the earliest part of development is currently in the spotlight in the developer world. What teams are now discovering is, this approach results in misdirected ownership for developers and a frustrated security team. In the current climate, we cannot afford to let security implementations falter. It's time to manage your team's energies to maximize DevOps efficiency, all the while maintaining top security standards. Join Shlomo Bielak, and learn how to keep your DevSecOps team focused and connected without creating silos.

Gartner Top 9 Security and Risk Trends for 2020

CEB IT

The shortage of technical security staff, the rapid migration to cloud computing, regulatory compliance requirements and the unrelenting evolution of threats continue to be the most significant ongoing major security challenges. However, responding to COVID-19 remains the biggest challenge for most security organizations in 2020. The primary goals of an XDR solution are to increase detection accuracy and improve security operations efficiency and productivity.

Trends 239

The NEW CompTIA Security+: Your Questions Answered

Association of Information Technology Professional

CompTIA Security+ got a big upgrade to reflect the changes in cybersecurity. If you're pursuing a career in cybersecurity, we have answers to some of the biggest questions about the new CompTIA Security

The Problem with Artificial Intelligence in Security

CTOvision

Read Dr. Leila Powell take a look at the security issues associated with artificial intelligence on Dark Reading: If you believed everything you read, artificial intelligence (AI) is the savior […].

Fix your cloud security

David Linthicum

I found some interesting statistics in this RedLock article that illustrate the severity of the cloud security problem: Only 7 percent of businesses have good visibility of all critical data, and 58 percent say they only have slight visibility. More than three-fourths of security breaches (80%) involve privileged credentials.

How to Measure DevSecOps Progress and Ensure Success

Speaker: Shannon Lietz, Director of DevSecOps Team, Intuit

You've finally done it: You've won over C-Suite and your DevSecOps team is up and running. You feel ready to take on rising security threats while continuously delivering quality software updates. But how do you monitor your new program? Are you truly able to gauge the state of your projects? To ensure the success of this new breed of a team, you need to know the metrics to look at and how to advocate these metrics to C-Suite and stakeholders. Join Shannon Lietz, Leader and Director of DevsecOps at Intuit, and learn to lead your DevSecOps team to the top.

Developing a Cloud Security Strategy

CTOvision

As organizations refine their cloud strategy, so do threat actors. Leveraging cloud platforms for use as malicious infrastructure is often a favorite ploy of sophisticated threat actors, enabling them to […].

The Security Yearbook by Richard Stiennon

CTOvision

I am so excited to now have an autographed copy of The Security Yearbook by Richard Stiennon. Cyber Security News BooksRichard is a prolific writer, a fantastic speaker, and is known the world over as perhaps the most savvy of all analysts in the cybersecurity field. Many of us have learned from him over the years, but his […].

Maximizing data privacy: Making sensitive data secure by default

CTOvision

Read Ayal Yogev explain how companies can maximize data security by making sensitive data secure by default on Help Net Security : Consider the case of contact tracing, which has […].

.Net 287

5 Strategic Cost Optimization Action Items for Security Leaders

CEB IT

Eighty-two percent of security and risk leaders do not adjust their budgets based on environmental or business impact, which means they operate in a silo and are not aligned with the business. Read more: Gartner Top 10 Security Projects for 2020-2021. Security

The Product Dev Conundrum: To Build or Buy in a Digital World?

Speaker: Mark Ridley, Owner and Founder, Ridley Industries

Any PM or technical leader who’s led the charge of building a digital product knows that product engineering is one of the most expensive elements of business. In most cases, actually building software should be the last avenue that companies explore to deliver great products, as software engineering, data science and product development are complex, uncertain and hard to manage.

The 15-Minute, 7-Slide Security Presentation for Your Board of Directors

CEB IT

When the request comes in to give a cybersecurity presentation to the board, security leaders should jump at the chance to educate the executives. Security and risk leaders will be presenting to the board at least on an annual basis, with some on a more frequent rotation. . Board members will have many questions about the organization's security strategy during this unprecedented event. . Read more: 5 Security Questions Your Board Will Inevitably Ask.

You too can be a security intelligence expert, with these free tools from Recorded Future

CTOvision

We enjoyed reading this good context from Graham Cluley’s blog: If 2020 taught the security industry anything, it is this: There has never been a better time to be a […].

Tools 240

Three Essential Mobile Security Measures

CTOvision

Read Andrew Hoog explain the three essential mobile security measures every company should adopt on DZone Blog : Many of us have heard of the 80/20 rule, also known as the ‘Pareto Principle.’ Applied to mobile application security, the idea is that guarding against threats with the greatest potential impact can mitigate 80 percent of […]. Cyber Security News

Mobile 210

7 Security Areas to Focus on During COVID-19

CEB IT

Now that many workers have shifted to working remotely and organizations are distracted trying to handle the virus, security and risk management teams need to be more vigilant than ever. Most of the security and risk team is now operating in completely different environments and mindsets. “Take preemptive steps to ensure the resiliency and security of your organization’s operations as attackers seek to exploit human nature and nonstandard operating modes.”

Cloud Security Alliance DC Update: Explore The Boundary of Security & Privacy on 13 June Cruise

CTOvision

The Boundary of Security & Privacy Privacy is becoming an ever increasing concern in our world today. Social Networks today are now focusing on users’ privacy given the inherent security risks posed by organizations’ access to personally identifiable information. Cloud Computing Cyber Security NewsThe European Union has enacted GDPR valuing privacy whereas on the opposite end of the spectrum, […].

Optimizing IoT Security by Implementing Artificial Intelligence

CTOvision

Read Liqaa Nawaf explain how artificial intelligence can help in optimizing Internet of Things security on Infosec Magazine : The Internet of Things (IoT) is growing rapidly in the markets […].

The Growing Importance Of Cyber Security Skills

CTOvision

As data breaches have become the order of the day, Adi Gaskell explains the growing importance of having cyber security talent in your company on Forbes : Cybercrime costs the UK several billion pounds per year. CTO Cyber Security News Training and EducationIndeed, a recent government report showed that 46% of all businesses identified at least one cyber attack in the last […].

Cyber Security in Aviation

CTOvision

Whether or not Roberts’ claims were true or whether or not his intentions were malicious, he brought to light the significant need to readdress aviation cyber security. During the 2015 Global Connected Aircraft Summit , a session was dedicated to the topic of aviation cyber security: “Cyber Security: How Can a Connected Aircraft Manage This Threat?” The increase of technology does not match the increase in technology security.

Gartner Top 10 Security Projects for 2019

CEB IT

When George took over as the CISO of a retail company, IT security was relatively simple. But as the organization has grown — adding online ordering, more employees and a host of cloud-based platforms and technology to support digital business across the organization — so have the security vulnerabilities. Plus, increased attacks and phishing attempts make it difficult to know what security projects to focus on and where to get the most ROI. Project 9: Container security.

GitLab Makes Building Secure Mobile Apps Easier

CTOvision

GitLab has made 60 enhancements to its namesake continuous integration/continuous delivery (CI/CD) platform to address a range of things from DevSecOps processes to collaboration, at a time when most DevOps […]. News Gitlab

Mobile 267

How to Stay Secure on GitHub

CTOvision

explain how you can stay secure on GitHub on Dark Reading : Open source software is a fact of life for enterprise software developers, and GitHub […]. Read Curtis Franklin Jr.

Automation For The Better Good - Security

Forrester IT

What these tasks have in common (in addition to relying on automation): a critical dependence on security. In a world where infrastructure-as-code scales quickly and massively scales, it is crucial to bake in security at every level of the stack. Information Security. Security Operations & Program Governance. application security.

Your Next Move: Network Security Analyst

Association of Information Technology Professional

If you like to make sure everything is secure and want to monitor and prevent security breaches, then network security analyst could be for you

Data-Centric Security and Zero Trust Architecture:

CTOvision

It’s been nearly ten years since John Kindervag first published a paper recommending what he called the “zero trust” model of information security. Cyber Security Disruptive IT information technology National securityThe time had come, he announced, to abandon the idea of unbreakable network perimeters, and to deal with the reality that intruders will inevitably find their way into protected networks. In the […].

Old School Security Tips that are More Relevant Than Ever

CTOvision

Read why Laurence Pitt says that old school tips for cybersecurity are most prudent in the current environment on Security Week: Cybersecurity hygiene has never been as crucial as it […].