Remove Architecture Remove CISO Remove IoT Remove Technology
article thumbnail

“Future of Vulnerability Management” Podcast Episode 6: The Role Vulnerability Management Plays in Proper Cyber Hygiene

NopSec

Lisa has a passion for connecting business with technology and thrives in transforming disruptive technology into leading solutions. In this episode, Lisa talks with Tim Brown, the CISO at SolarWinds. Tim drives the creation, architecture, strategy, and external visibility for products and solutions.

article thumbnail

How to build a zero trust ecosystem

SC Magazine

With its tailored controls, micro-perimeters and trust-nothing approach to access, Zero Trust gives CISOs confidence that their security program can secure their remote workforce and meet regulatory compliance requirements. Thanks to a rapid shift to remote work, Zero Trust is finally garnering the attention it deserves. What is Zero Trust?

CISO 134
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Executive Spotlight: Q&A with Chief Information Officer, Scott Howitt

McAfee

Now that we’ve officially kicked off our journey as McAfee Enterprise , a pure-play enterprise cybersecurity company under the new ownership of Symphony Technology Group (STG), we’re celebrating a lot of new firsts and changes. I found that I had a passion for information security and have been the CISO at two different Fortune 500 companies.

CISO 78
article thumbnail

AT&T Business Summit is virtual Oct. 27-28 and free!

CyberSecurity Insiders

Given how critical security is to digital transformation and our ability to innovate, we’ve got a robust line-up of cybersecurity topics – from SASE to zero trust and the technologies you need to help protect your business. We hope that you join us as we take this journey together. Join us from October 27-28, 2021 by registering.

article thumbnail

A Reflection On ForAllSecure's Journey In Bootstrapping Behavior Testing Technology

ForAllSecure

This doesn’t allow the IT administrator, the end-user, or the CISO to independently verify the security, safety, and resiliency of the software they buy and use. That’s true today because we do not have the right technology. We began our research in a university lab, where a brand new technology was born.

article thumbnail

2022 Cybersecurity predictions

CyberSecurity Insiders

In 2022, we will see 5G go from new technology to a business enabler bringing previously unimaginable use cases because of its high bandwidth and lower latency. Data from the current AT&T Cybersecurity Insights Report shows that 5G technology is being driven by the line of business and has been siloed between IT and OT organizations.

article thumbnail

A Reflection On ForAllSecure's Journey In Bootstrapping Behavior Testing Technology

ForAllSecure

This doesn’t allow the IT administrator, the end-user, or the CISO to independently verify the security, safety, and resiliency of the software they buy and use. That’s true today because we do not have the right technology. We began our research in a university lab, where a brand new technology was born.