Steve Katz, the world's first CISO, who cut his teeth at Citi and Merrill Lynch, stays current with emerging tech and business trends, and he has advice to share with the next generation of cybersecurity leaders.
Let's Encrypt is going to take a softer approach to resolving the impacts from a bug in its systems that issues free TLS certificates. It will hold off revoking about 1 million certificates until those certificates either expire or are replaced.
It's relatively easy to list an enterprise's cybersecurity priorities for 2020. But who owns them? What are the hurdles to completing these projects? These can be tougher questions to answer, says Ellen Sundra of Forescout.
A key disconnect exists between awareness of financial services fraud schemes and mitigation, according to the latest "Faces of Fraud" survey sponsored by Appgate. Mike Lopez, vice president at the firm, describes some key findings.
Remote workers, connected devices, cloud services and infrastructure - these are the elements of the new workplace. Now, how do you secure it? That's the challenge discussed by David Wagner, CEO of Zix.
Career privacy officer Michelle Dennedy now finds herself in a unique position as CEO of DrumWave, a startup data services company. At a time when privacy is a growing business imperative, what influence can she bring to this leadership role?
Ten years since he coined the term "zero trust," John Kindervag, field CTO of Palo Alto Networks, sees CISOs increasingly being faced with the challenge of having to implement the "never trust, always verify" model across increasingly complex IT environments, including cloud and IoT.
Marc Rogers has been a hacker since the 1980s - notable as organizer of DEF CON - and he is pleased to see his unique set of skills now embraced by the industry and being used to make cybersecurity smarter and easier to use.
Enterprises have such product sprawl in their security stacks today, it's hard to establish - much less maintain - any degree of visibility. Joe Partlow of ReliaQuest discusses how to improve visibility, as well as how to train security teams via simulated attacks.
Edna Conway, who recently joined Microsoft Azure, has been called the "mother of value chain security architectures." She talks about the platform economy and what that means for addressing security and third-party risk.
Passwords are the access point to almost every system in our environment. Can they ever truly be replaced? John Bennett of LogMeIn talks about the steps necessary to create a secure, passwordless login experience.