Thought Leaders Discuss the “Human Element” at RSA Conference 2020
San Francisco, CA. – The theme at RSA Conference 2020 focused on “The Human Element,” highlighting the current trend toward focusing on end-user experience, vulnerability, and empowerment throughout the InfoSec…
Cross Domain Solutions – Quo Vadis
By Alexander Schellong, VP Global Business, INFODAS Highly sensitive systems and data assets (domains) are often separated from the Internet or less critical systems. Separation is achieved through isolation, commonly…
Demystifying Network Investigations with Packet Data
By Michael Morris, Director of Global Technologies Alliances and Business Development, Endace A common challenge for security analysts, network operations and application teams is lacking the right data to troubleshoot…
Securing the Next Generation Data Center
By Dr. Ratinder Paul Singh Ahuja, Chairman of the Board & Chief R&D Officer ShieldX Networks Securing Cloud-Generation Data Centers As many firms transition their data centers into the…
Stopping Fraud and Threats with XTN
By Guido Ronchetti, CTO of XTN Cognitive Security XTN develops Behavioral-based Fraud and Threat Protection solutions designed to defend digital businesses. Our security solutions are Cognitive, using proprietary AI algorithms….
5 Ways Hackers Can Bypass Your MFA
Think Your Sensitive Systems Are Secure? Think Again. By Dana Tamir, VP Market Strategy for Silverfort Let me start by saying – you should be using MFA (Multi-Factor Authentication) on…
The Evolution of PAM
By Mahesh Babu, Sr. Director and Head of Product Marketing at Remediant When assessing an organization’s cybersecurity posture, privileged accounts are the most critical to safeguard because of their proverbial…
Defending Forward
Human-Machine Teaming for Automated Predictive Prevention at Scale By James Wallace Hess, Director of Development, Cythereal Today’s threat landscape demands automated analysis and predictive prevention to efficiently harden protection structures…
General Motors & the AUTO-ISAC are “Defending YOUR Wheels™”*
San Francisco – The title of the keynote presentation at RSA by Mary Barra, Chairman and Chief Executive Officer of General Motors, aptly describes the reality for anyone who is…
World’s Largest Cybersecurity Unicorn Lives in China
By Edward Tsai – Director of Investment, Qi An Xin Who would think that the world’s largest Cybersecurity unicorn lives in China? In China, everything is on a larger scale….
Vulnerability Management Democratized
New solutions are built with ease of use and efficiency in mind By Todd Nielsen, Director, Product Management, IGI Vulnerability Management has always been complicated; it required pro tools (read,…
Firewall Sandwich: A Hacker’s Delight, Unless…
No single solution can offer a silver bullet for cybersecurity. Nevertheless, critical facilities such as manufacturing plants and power stations are currently in danger of relying too heavily on firewalls…