In August 2024, members of the CyberRisk Collaborative organized a task force to address the complexities faced by CISOs in implementing and optimizing incident response programs. This task ...
Mitchell Greenfield is currently AVP, Identity and Access Management at Humana. Mitch leads a team of around 200 identity specialists focused on managing identity risk for large complex health ...
As eSentire’s Chief Cyber Resilience Officer & Field CTO, Tia is focused on engaging with the cybersecurity community, providing thought leadership, supporting strategic customer and partner ...
Michael has been in the security/cyber security and incident response/forensic investigation and security software space for more than 20 years. He has been certified in endpoint security ...
Third parties, whether they provide software or services to an organization, can introduce significant security risks, including ransomware, software vulnerabilities, loss of services, and ...
Security teams need more from their tools – full stop. Cyware’s Threat Intelligence Platform (TIP) goes beyond the traditional offerings, leveraging advanced threat intelligence automation ...
AI is fundamentally changing how software is written. Developers are increasingly relying on code generated by leveraging generative AI tools and application security experts are scrambling to ...
Is Your Browser the Weakest Link in Your Security Chain? Zero Trust has been the gold standard in cybersecurity for over a decade, but most organizations are still ...
Innovation is key to staying ahead in cybersecurity, but sometimes chasing the 'next big thing' doesn't lead you to the right destination. While it can seem essential to adopt the latest and ...