True or False: Quantum computing will break cryptography as we know it today? RSA CTO Zulfikar Ramzan shares his thoughts and opens up on the trends he sees driving the cybersecurity marketplace in the decade ahead.
What is Big Game Hunting in the cybercrime context, and how are industry sectors being targeted? Jennifer Ayers of CrowdStrike shares insights on this and other trends detailed in 2020 Global Threat Report.
The Cryptographer's Panel, which sees five cryptography experts analyze and debate top trends, remains a highlight of the annual RSA conference. For 2020, the panel focused on such topics as facial recognition, election integrity and the never-ending crypto wars, while giving shout-outs to bitcoin and blockchain.
The human element is a fundamental component of some of the newest cyberattacks that Sophos has been tracking, says the firm's principal research scientist, Chet Wisniewski, who advises organizations to adapt their security and protection plans accordingly.
Just as consumers can look at a box of Twinkies and read a list of ingredients, so too should software makers provide users with a "bill of materials" explaining their composition, says Allan Friedman, director of cybersecurity initiatives at the U.S. National Telecommunications and Information Administration.
Software development over the past decade: The good news is that more organizations than ever have secure software development practices in place, says Chris Eng, chief research officer at Veracode. But the bad news is that many of the same flaws - including injection vulnerabilities - persist.
Moving from EDR to XDR creates new visibility gaps for organizations, says Sameer Malhotra of TrueFort, who explains a new approach to application threat detection and response.
Today's security practitioners need to fuse cybersecurity with compliance and privacy. Stacy Scott and Alan Brill of Kroll discuss a defensible security strategy.
Malware defenses today too often function as black boxes, producing binary results that make it difficult for security teams to prioritize, when what's needed is transparency, to enable defenders to better understand threats and prioritize their response, says Mario Vuksan, CEO of ReversingLabs.
Deception technology has come of age in the marketplace, but there is still some customer confusion about the distinct use cases. Ofer Israeli, CEO of Illusive Networks, shares how mature companies deploy deception.
APIs are exposing a lot of business logic to exploitation, says Shreyans Mehta, co-founder & CTO and Cequence Security, who offers insights on enhancing API security.
Marcus Fowler of Darktrace discusses the 2020 U.S. presidential election cyberthreat landscape and the roles that artificial intelligence and machine learning are now playing in mitigating more cyber risks.
There are glaring holes in how enterprises currently tackle security analytics, and by redefining the approach, the analyst's role can be transformed. Dr. Anton Chuvakin of Chronicle explains how.
Webroot just released its 2020 Threat Report. How has the landscape changed, and what cybersecurity predictions are made for 2020? Hal Lonas of OpenText shares insights and outlines the next round of research into artificial intelligence and machine learning.
From buzzword to practical application, artificial intelligence quickly has made an impact in cybersecurity - particularly in the security operations center. Bryce Schroeder of ServiceNow projects how AI and automation will continue to influence SOCs - and the analyst's role.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.eu, you agree to our use of cookies.