Creating Version Eight of the Center for Internet Security’s CIS Controls
In this episode of the Business of InfoSec Podcast, we talk to Center for Internet Security editorial panel member Rick Doten about the version eight updates to the organization's CIS Controls
Stopping Email Threats at the Door
Adenike Cosgrove, Proofpoint International’s Senior Director of Product Marketing, argues that the risk of numerous cyber threats can be significantly reduced by improving email security – the number one ransomware threat vector
Zero Trust: Cutting Through the Spin
CISOs are increasingly implementing zero-trust initiatives as they modernize their security architecture – but how much of zero trust is marketing spin?
Secure Digital Transformation and Data Democratization Top Agenda at CISO London
As CISO and Head of Data Governance for insurance company esure, Stephen Owen had a golden opportunity to empower his business by creating a transformational data access platform with privacy and security at its core
We Are Losing the War Against Offensive AI
Cybercriminals have weaponized AI and the threat is too great for legacy defense tactics argues Darktrace Director of Threat Hunting Max Heinemayer
How Covid-19 Challenged Security Programs Across Industries
Our CISO Live, US expert panel discusses their experiences of battling the changing cybersecurity landscape and how to emerge stronger after the pandemic
The Reinvention of the Managed Security Service Provider
Paul Grapendaal, Head of Managed Services at South African computer security specialist Nclose, discusses why managed security service providers find themselves in the spotlight
Mitigating the Danger of Insider Threats in Financial Institutions
Cybersecurity executives are implementing measures to control the damage that can be caused by bad actors who already have a foothold inside networks
Trust Issues: Adopting a Zero Trust Framework
Adopting a zero-trust infrastructure has become a priority for many cybersecurity leaders as their businesses rapidly expand their data use