article thumbnail

CTO of Center for Internet Security Expounds on Transforming InfoSec

SecureWorld News

And have you thought about verification? Can you do more in that space? Or is that just too much of a reach?

InfoSec 76
article thumbnail

Business Must Change: InfoSec in 2019

The Falcon's View

That said, there was definitely a watershed moment in the mid-1990s marking a clear transition from the old Deming-era industrial ways to this modern digital era. Consider, if you will, that fundamentally we in infosec want people to make better decisions. That's right, it's infosec.

InfoSec 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Accelerate Open Banking Innovation with These 7 Data Capabilities

Security Boulevard

However, InfoSec lacks visibility into data dispersed across a vast multi-generational architecture and struggles to mask it, so they must limit access to production data, curtailing innovation. . BNP Paribas is accelerating its digital transformation journey to build the European bank of reference.” .

Banking 142
article thumbnail

Cyber CEO: 3 Key Components for Resilient Third Party Risk Management

Herjavec Group

In the wake of the pandemic, we continue to see rapid digital transformation – including big changes to the way enterprises require and engage third parties. Commerce is now advancing at a speed that makes it extremely difficult for infosec professionals to keep up. I joined Art Coviello, board member at SecZetta Inc.

Risk 52
article thumbnail

How You Can Effectively Manage Your SSH Keys Towards Zero Trust Security

Security Boulevard

Because of the ongoing digital transformation efforts, large enterprises have accumulated tens of thousands of SSH keys in their environment. They also provide better visibility for InfoSec teams by providing insight into who is requesting the certificates. SSH keys bear no meta data and never expire. UTM Medium. UTM Source.

Risk 52
article thumbnail

Cyber CEO: 5 Outdated but Common Cybersecurity Practices You Should Avoid

Herjavec Group

Enterprises have experienced lightning-fast digital transformation over the past 18 months. Security consultants identify exploitable flaws in the security architecture, detective controls, and preventative controls to help build strategies that effectively secure and protect the environment from malicious actors.

article thumbnail

Cyber CEO: A Look Back at Cybersecurity in 2021

Herjavec Group

On top of this, the consequences of rapid digital transformation due to the COVID-19 Pandemic created the perfect storm for successful ransomware attacks. This has been exacerbated by the pandemic and the digital transformation that many organizations recently experienced.