How To Deal With Employees As The New Security Perimeter

CTOvision

Read Robert Fly, Co-founder and CEO, Elevate Security explain how organizations should deal with employees as a new cybersecurity risk perimeter on Forbes : Let’s look back in time about a year when security executives woke up and realized it was about to get (even more) real.

4 Steps to Ensure Robotic Process Automation Security

CEB IT

If the data is not secured, it can be exposed and can cost organizations millions of dollars. “Without proper security measures in place, the sensitive data, such as RPA bot credentials or customer data that RPA handles, can be exposed to attackers. Enable secure RPA development.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Elevate Security Produces Global Employee Risk Insights Report

CTOvision

Elevate Security has produced a first-of-its-kind analysis of more than 1.5 million anonymized employees’ security decisions. This groundbreaking research is the industry’s first global research report on employee security decisions […]. News Elevate Elevate Security

Report 240

Gartner Top Security and Risk Trends for 2021

CEB IT

As cybersecurity and regulatory compliance become the top two biggest concerns of corporate boards, some are adding cybersecurity experts specifically to scrutinize security and risk issues. The reality of security today is that security leaders have too many tools. IT Security

Trends 261

How to Measure DevSecOps Progress and Ensure Success

Speaker: Shannon Lietz, Director of DevSecOps Team, Intuit

The new DevSecOps team is up and running, and you feel ready to take on rising security threats while delivering quality software updates. But that leaves just one question: how do you monitor your new program as effectively and efficiently as possible? Join Shannon Lietz, Director of DevsecOps at Intuit, and award-winning innovator, to learn the answers to these questions so you can lead your DevSecOps team to the top!

Develop a Security Strategy for Cyber-Physical Systems

CEB IT

These cyber-physical systems introduce a new set of risks that few security and risk leaders have had to consider. Download eBook: 2021 Top Priorities for Security and Risk Management Leaders. Plan for cyber-physical systems security. IT Security

Gartner Top Security Projects for 2020-2021

CEB IT

“Are you trying to ensure security for your remote workforce but don’t want to hinder business productivity?” ” “Are you struggling with identifying risks and gaps in security capabilities?” 1: Securing your remote workforce. Security

Grip Security aims to simplify and automate SaaS endpoint security

Venture Beast

Grip today announced it has raised $6 million in a round led by YL Ventures as the Israeli company develops a new SaaS security approach. Read More.

Fugue Cloud Security Adds Support for Container Runtimes

CTOvision

Fugue today announced it has extended its eponymous platform for securing cloud environments to include container runtime environments. News Fugue Fugue Cloud Security

Interview: Tom Davison, Technical Director EMEA, Lookout Mobile Security

CTOvision

According to recent statistics from Lookout Mobile Security, drawing on analysis of nearly 200 million mobile devices running Lookout’s security software, as many as 50% of Android users globally are […]. News Lookout Lookout Mobile Security

Mobile 240

Imperva acquires API security company CloudVector

Venture Beast

Cybersecurity company Imperva announced plans to acquire API security startup CloudVector for an undisclosed sum. Read More.

The Unexpected Cost of Data Copies

This paper will discuss why organizations frequently end up with multiple data copies and how a secure "no-copy" data strategy enabled by the Dremio data lake service can help reduce complexity, boost efficiency, and dramatically reduce costs.

The Security Yearbook by Richard Stiennon

CTOvision

I am so excited to now have an autographed copy of The Security Yearbook by Richard Stiennon. Cyber Security News BooksRichard is a prolific writer, a fantastic speaker, and is known the world over as perhaps the most savvy of all analysts in the cybersecurity field.

Gartner Top 9 Security and Risk Trends for 2020

CEB IT

The shortage of technical security staff, the rapid migration to cloud computing, regulatory compliance requirements and the unrelenting evolution of threats continue to be the most significant ongoing major security challenges. Security

Trends 312

The Problem with Artificial Intelligence in Security

CTOvision

Read Dr. Leila Powell take a look at the security issues associated with artificial intelligence on Dark Reading: If you believed everything you read, artificial intelligence (AI) is the savior […].

Imperva’s Mobile Security App

CTOvision

Read Michael Wright take a look at Imperva’s mobile security App on Security Boulevard: How many apps do you currently have on your mobile device?

Mobile 240

Top Actions From Gartner Hype Cycle for Cloud Security, 2020

CEB IT

Organizations may no longer question its utility, but security remains a commonly cited reason for avoiding it. In reality, the public cloud can be made secure enough for most uses. Here are three technologies from the Gartner Hype Cycle for Cloud Security, 2020, to action right now.

Building Like Amazon

Speaker: Leo Zhadanovsky, Principal Solutions Architect, Amazon Web Services

Amazon's journey to its current modern architecture and processes provides insights for all software development leaders. To get there, Amazon focused on decomposing for agility, making critical cultural and operational changes, and creating tools for software delivery. The result was enabling developers to rapidly release and iterate software while maintaining industry-leading standards on security, reliability, and performance. Whether you're developing for a small startup or a large corporation, learning the tools for CI/CD will make your good DevOps team great. We are excited to be joined by Leo Zhadanovsky, a Principal Solutions Architect at Amazon Web Services.

Thistle tackles IoT security by helping vendors update devices

Venture Beast

million seed funding to help IoT vendors develop ways to securely and easily update their connected devices. Thistle Technologies gets $2.5 Read More.

Contrast Security

CTOvision

Contrast security seeks to usher in a new era of self-protecting software. From their website: Contrast Security is the world’s leading provider of security technology that enables software applications to protect themselves against cyberattacks. Only Contrast has intelligent agents that work actively inside applications to prevent data breaches, defeat hackers and secure the entire enterprise from development, to operations, to production. Research Team.

The Consequences Of Choosing Speed Over Security

CTOvision

Read why Joel Wallenstrom, CEO & President of Wickr says that choosing speed over security could prove dangerous on Forbes : In the wise words of Richard Powers, “Money you […].

The 15-Minute, 7-Slide Security Presentation for Your Board of Directors

CEB IT

When the request comes in to give a cybersecurity presentation to the board, security leaders should jump at the chance to educate the executives. Security and risk leaders will be presenting to the board at least on an annual basis, with some on a more frequent rotation. .

Data Analytics in the Cloud for Developers and Founders

Speaker: Javier Ramírez, Senior AWS Developer Advocate, AWS

You have lots of data, and you are probably thinking of using the cloud to analyze it. But how will you move data into the cloud? In which format? How will you validate and prepare the data? What about streaming data? Can data scientists discover and use the data? Can business people create reports via drag and drop? Can operations monitor what’s going on? Will the data lake scale when you have twice as much data? Is your data secure? In this session, we address common pitfalls of building data lakes and show how AWS can help you manage data and analytics more efficiently.

Contact Center Security: Anomaly Detection and Fraud Prevention Best Practices

CTOvision

Read how Pindrop helps in the Contact Center security through anomaly detection and fraud prevention on their blog: Fraud costs don’t start in your finance department. News Pindrop Pindrop Security

Data security depends on a secure software-development supply chain

Venture Beast

Russia's SolarWinds hack gave it access to data from federal agencies because we haven't secured the software supply chain. Cloud Dev Enterprise Security VB Home Page category-/Computers & Electronics/Computer Security Open source SolarWinds supply-chain attack

Cloud Security Spending Will Grow To $3.5 Billion By 2021

Forrester IT

What does this mean for cloud security? · This rapid shift to the cloud raises new issues and challenges for security and risk professionals. Traditional perimeter-based security tools do little to protect cloud workloads. Securing data and applications that reside in the cloud is increasingly critical as more mission-critical apps and high-value data and intellectual property move to the cloud. Cloud Security. cloud access security brokers.

7 Security Areas to Focus on During COVID-19

CEB IT

Now that many workers have shifted to working remotely and organizations are distracted trying to handle the virus, security and risk management teams need to be more vigilant than ever. Most of the security and risk team is now operating in completely different environments and mindsets.

The Next-Generation Cloud Data Lake: An Open, No-Copy Data Architecture

A next-gen cloud data lake architecture has emerged that brings together the best attributes of the data warehouse and the data lake. This new open data architecture is built to maximize data access with minimal data movement and no data copies.

Palo Alto Networks launches IoT security solution

CTOvision

Cybersecurity firm Palo Alto Networks has launched a new Internet of Things (IoT) security solution specifically for the healthcare sector. IoT Security intends to simplify the challenge of securing the […]. News Palo Alto Networks Palo Alto Networks Inc

Are Your New Remote Workers Visible to Security Operations?

CEB IT

While this move creates obvious challenges for IT in terms of infrastructure and capacity, it’s also creating challenges for security teams as they push to scale remote work on a rapid and global level. Lack of visibility does not equate to a lack of security vulnerabilities.

Fix your cloud security

David Linthicum

I found some interesting statistics in this RedLock article that illustrate the severity of the cloud security problem: Only 7 percent of businesses have good visibility of all critical data, and 58 percent say they only have slight visibility. More than three-fourths of security breaches (80%) involve privileged credentials.

Palo Alto Networks latest security giant accused of patent infringement

CTOvision

A company is suing Palo Alto Networks for patent infringement, alleging that proprietary technologies were demonstrated to the cybersecurity giant, then used in a number of its major security products and systems.

Shift Left Security? Development Does Not Want to Own It.

Speaker: Shlomo Bielak, CTO, Benchmark Corp

Shifting security left to the earliest part of development is currently in the spotlight in the developer world. What teams are now discovering is, this approach results in misdirected ownership for developers and a frustrated security team. In the current climate, we cannot afford to let security implementations falter. It's time to manage your team's energies to maximize DevOps efficiency, all the while maintaining top security standards. Join Shlomo Bielak, and learn how to keep your DevSecOps team focused and connected without creating silos.

Set Up a Budget-Friendly Application Security Program

CEB IT

In May 2020, a smartphone caller identification app reported a security breach in which the personal data of more than 47.5 In contrast to common perception, app security testing doesn’t always have to be a heavy investment. Security

Budget 259

Most enterprises struggle with IoT security incidents

CTOvision

According to new data released by Cybersecurity Insiders, 72% of organizations experienced an increase in endpoint and IoT security incidents in the last year, while 56% anticipate their organization will […].

Hire the Right Teachers for Better Security Awareness

CEB IT

This module on avoiding phishing scams at work is something every employee should want to know about and yet, like many security programs, this one is creating very little engagement. Many employees view security training as boring and hard to understand. Dedicate security resources.

Assessing Enterprise Firmware Security Risk in 2021

CTOvision

In a year of historic challenges, 2020 saw firmware and hardware issues become one of the most active areas of enterprise security. APT and ransomware threat actors targeted enterprise VPNs […]. News Eclypsium

Your Team's Pragmatic Guide to Security

Speaker: Naresh Soni, CTO, Tsunami XR

The pandemic has led to new data vulnerabilities, and therefore new cybersecurity threats. As technology leaders, it's time to rethink some of your product security strategies. Whether you need to rework your security architecture, improve performance, and/or deal with new threats, this webinar has you covered.

IoT Security and Physical Safety

CTOvision

Read take a look at the Internet of Things security and physical security and how they are interconnected on IoT For All: Today, we rely on IoT devices more than […].

Experian: Consumers prefer ‘invisible security’ to passwords

Venture Beast

A new study ranked "invisible" methods such as biometrics, pin codes, and passive security as consumers' favorites. Big Data Cloud Dev Enterprise Security VB Home Page biometric category-/News Experian invisible security

Study 88

SASE-ready Architecture with Netskope Security Cloud and Your Existing Security Infrastructure

CTOvision

With the inversion of the traditional network, where users, data, and apps are now on the outside, traditional approaches to security fall short. At most enterprise organizations, the cyber security […].

Securing SAP SuccessFactors – Protecting Human Capital

CTOvision

Read Matt Hines explain how CipherCloud offerings protect cloud applications on Security Boulevard : It goes without saying that your own organization’s most strategic cloud application is the most important […].

SAP 254

The Product Dev Conundrum: To Build or Buy in a Digital World?

Speaker: Mark Ridley, Owner and Founder, Ridley Industries

Any PM or technical leader who’s led the charge of building a digital product knows that product engineering is one of the most expensive elements of business. In most cases, actually building software should be the last avenue that companies explore to deliver great products, as software engineering, data science and product development are complex, uncertain and hard to manage.