featureTeams, Slack, and GitHub, oh my! – How collaborative tools can create a security nightmareSome of today’s most popular and useful information-sharing platforms can leave a lot to be desired from a security standpoint. Here are some of the issues and how to mitigate them.By Susan Bradley19 Mar 20247 minsWindows SecurityApplication SecurityCloud Security feature Cyber Trust Mark concept gains momentum with smart device and IoT manufacturersBy Chris Hughes06 Feb 20249 minsSecurity HardwareComplianceSecurity Practicesnews AI enters production systems even as ‘trust’ emerges as a growing concernBy Shweta Sharma14 Dec 20234 minsGenerative AISecurity Infrastructure newsAI dominates cybersecurity megatrends for 2024: Report By Shweta Sharma 13 Dec 20234 minsGenerative AISecurity Infrastructure featureHow to maintain a solid cybersecurity posture during a natural disasterBy James Careless 30 Nov 20238 minsSecurity Operations CenterData and Information SecuritySecurity Practices newsNetRise releases Trace solution with AI-powered semantic search aimed at protecting firmwareBy Andrew Flynn 09 Nov 20233 minsInternet SecuritySecurity Monitoring SoftwareSecurity Practices featureSecure from the get-go: top challenges in implementing shift-left cybersecurity approachesBy Mary Pratt 07 Nov 202312 minsDevSecOpsSecurity PracticesSecurity Infrastructure newsFIDO Alliance certifies security of edge nodes, IoT devices By Michael Hill 27 Sep 20233 minsCertificationsInternet SecuritySecurity Hardware featureWhat’s a cyber incident response retainer and why do you need one?By Linda Rosencrance 27 Sep 20238 minsCyberattacksIncident ResponseSecurity Practices ArticlesopinionViews of a hot cyberwar — the Ukrainian perspective on Russia’s online assaultA report from Ukraine’s cybersecurity service reveals insight into what the country has been facing from belligerent attackers and holds a lesson for CISOs.By Christopher Burgess 04 Apr 2023 5 minsData and Information SecuritySecurity InfrastructureSecurity PracticesopinionTransparency and policy shapes Cloudflare’s Kiwi Farms decisionsCloudflare's blocking of hate-based forum Kiwi Farms is the latest in a string of controversial actions and inactions around bad behaving customers. Agree or disagree, the company has stuck to its policy throughout.By Christopher Burgess 06 Sep 2022 5 minsSecurity InfrastructureSecuritynews analysisNIST CSF 2.0 Workshop emphasizes global appeal, metrics and assessmentAbout 7,000 international workshop attendees heard discussion on NIST's plan to update its Cybersecurity Framework to incorporate more guidance on supply chain security, measurement, and implementation, among other topics.By Cynthia Brumfield 18 Aug 2022 8 minsIT Governance FrameworksSecurity InfrastructurenewsSnowflake offers cybersecurity data platform with security app integrationsSnowflake's cybersecurity workload integrates the company's data cloud, storage and query features with tools from cybersecurity vendors, for enhanced threat detection, investigation and alerts.By Shweta Sharma 09 Jun 2022 3 minsData WarehousingSecurity InfrastructureCloud Computingfeature7 top challenges of security tool integrationWith organizations using as many as 100 security tools, getting them to work well together is an ongoing battle. These are the most common pitfalls of security tool integration.By Bob Violino 08 Feb 2022 6 minsNetwork SecuritySecurity Infrastructurefeature6 risk factors to know when hiring an MSSPA managed security services provider can effectively extend an organization's security capabilities or provide affordable security infrastructure if you avoid these common mistakes.By Jaikumar Vijayan 13 Aug 2021 9 minsSecurity InfrastructureSecurityfeatureWhat is physical security? How to keep your facilities and devices safe from on-site attackersSecuring premises and devices from physical attacks can be just as challenging as defending against cyber threats. Automation and AI are increasingly used to shore up defenses. By Dan Swinhoe 04 Aug 2021 13 minsCritical InfrastructureSecurity InfrastructureSecurityfeatureHow to reboot a broken or outdated security strategyCISOs talk about how they identify when they need a new security strategy and the process of developing it and selling the reboot to stakeholders.By John Edwards 18 Jan 2021 7 minsSecurity InfrastructureSecurityfeature4 key benefits of NOC/SOC integration and tips for making it workCompanies that have started the SOC/NOC integration process report improved security and operational efficiencies, but had to overcome technical and cultural challenges. By Neal Weinberg 14 May 2020 8 minsNetwork SecuritySecurity InfrastructureSecuritynews analysisOpen-source options offer increased SOC tool interoperabilityToo many security tools in your SOC, and none of them talk to each other, but new vendor-supported open-source projects might lead to greater interoperability.By J.M. Porup 11 Mar 2020 4 minsNetwork SecuritySecurity InfrastructureSecurityfeatureClosing the security gap in OT/IT convergenceEnd-to-end security between converging information technology and operational technology worlds is imperative, but technical and cultural differences separate them. Here’s how to close the gap.By Stacy Collett 27 Jan 2020 8 minsInternet of ThingsSecurity InfrastructureSecurityopinionWhat lessons can we learn from Notre Dame to better prepare for cyberattacks?The Notre Dame cathedral – one of mankind’s greatest achievements – is not only a monument to Catholicism, but also to the French people who built and maintained this landmark over centuries…and will now rebuild this icon again. As infosec professionals, we can learn many lessons from this event and use them to build better architectures for our customers.By Mitchell Parker 16 Apr 2019 9 minsTechnology IndustryData and Information SecuritySecurity Infrastructure Show more Show less View all Resources whitepaper Are You Data and AI Ready? Digital transformation creates a $100 trillion opportunity for enterprises, but also leads to infrastructure challenges with data exchange and platform growth. The post Are You Data and AI Ready? appeared first on Whitepaper Repository –. By Digital Realty Trust, L.P. 14 Mar 2024Other whitepaper DO’S & DON’TS for Enrollment Officers By Classter 12 Feb 2024Business OperationsData ManagementEducation Industry whitepaper Student Information, School and Learning Management System By Classter 12 Feb 2024Business OperationsData ManagementEducation Industry View all Podcasts podcastsSponsored by Microsoft SecurityStrengthen and Streamline Your SecurityThis podcast series brought to you by Microsoft and IDG, will explore the core components of a modern security strategy, with insights and tips from leading security experts. We’ll discuss how ongoing and ever-changing threats, a growing security stack, and a shift to remote work make it difficult for CISOs and their security teams to balance enterprise-grade security with end-user productivity.0 episodeData and Information Security Ep. 03 Episode 3: The Zero Trust Model 25 Mar 202115 mins Multi-factor AuthenticationCSO and CISORemote Work Ep. 04 Episode 4: Reduce SOC burnout 29 Mar 202115 mins CSO and CISOPhishingRemote Work Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos news AT&T suffers critical breach impacting 73 million customers By Shweta Sharma 01 Apr 20244 mins Data Breach feature Recruit for diversity: Practical ways to remove bias from the hiring process By Aimee Chanthadavong 01 Apr 20248 mins Careers feature The CSO guide to top security conferences By CSO Staff 01 Apr 202417 mins Technology IndustryIT SkillsEvents podcast CSO Executive Sessions: 2024 International Women's Day special 13 Mar 202410 mins CSO and CISO podcast CSO Executive Sessions: Former convicted hacker Hieu Minh Ngo on blindspots in data protection 20 Feb 202421 mins CSO and CISO podcast CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison 20 Nov 202315 mins CSO and CISO video CSO Executive Sessions: Geopolitical tensions in the South China Sea – why the private sector should care 01 Apr 202416 mins CSO and CISO video CSO Executive Sessions: 2024 International Women's Day special 13 Mar 202410 mins CSO and CISO video LockBit feud with law enforcement feels like a TV drama 05 Mar 202456 mins RansomwareArtificial Intelligence