Machine learning can play an important role in fraud prevention at financial institutions, says Marc Trepanier of ACI Worldwide, who addresses the challenges involved.
The need for enhanced mobile application security is being driven by increasingly powerful mobile devices and ubiquitous availability of bandwidth, says John Aisien, CEO, Blue Cedar.
Too many organizations continue to approach security with a "perimeter defense" mindset despite enterprise networks long having moved past on-premises data centers to myriad cloud services, says Ajay Arora of Vera Security.
Threat hunting is a critical but labor-intensive task for security analysts. But automation can provide significant advantages, says Steven Grossman of Bay Dynamics.
CISOs need to work with partners in other departments to help ensure the success of major security projects, says John Pescatore, the director of the SANS Institute, who spoke at RSA Conference 2019.
The traditional information network is undergoing radical change, and so is the approach to network security. Jesse Rothstein of ExtraHop discusses the present and future of enterprise network security.
What's the difference between an elite and a less mature DevSecOps program? Sonatype's Derek Weeks unveils the results of the 2019 DevSecOps Community Survey.
The latest edition of the ISMG Security Report features updates from RSA Conference 2019 on IoT and the cloud, GDPR compliance challenges and much more.
Information security programs continue to rely not just on security policies, but also the controls that ensure they get enforced. Unfortunately, such controls begin degrading the moment they're put in place, sometimes rapidly, says Josh Mayfield, director of security strategy at Absolute Software.
Gaining a holistic view of corporate data in today's multicloud world is a challenge, says Alejandro Lavie of Flexera, who describes a path to establishing a single view.
How can enterprises couple automated processes with human intelligence to improve threat detection? Brian NeSmith of Arctic Wolf Networks shares insights.
Every security leader wants visibility into the potential attack surface. But that surface is changing in vast new ways, owing to the cloud and connected devices. Mario Vuksan of ReversingLabs defines what visibility truly means today.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.co.uk, you agree to our use of cookies.