article thumbnail

BrandPost: Tackling Security in the World of Containers, Hybrid Cloud, and DevSecOps

CSO Magazine

But, as traditional infrastructure evolves to a mix of bare metal, virtual, cloud, and container environments, security teams are increasingly finding it challenging to keep up with the shifting risks, compliance requirements, tools, and architectural changes introduced by new technologies.

article thumbnail

How to build a zero trust ecosystem

SC Magazine

Built on an identity-centric framework for security, Zero Trust completely transforms both current and legacy IT models. My experience implementing Zero Trust has shown me that, while the process to implement a complete architecture takes time, the transformation is worth the effort and the benefits will be realized throughout the journey.

CISO 134
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

People Skills Outweigh Technical Prowess in the Best Security Leaders

SecureWorld News

But it is vital as they fight for cybersecurity budget, try to explain risk, and explain the importance of line items such as security awareness training, blue, red and purple team exercises, and more. That's a soft skill that even the most adept CISOs are still trying to master.

CISO 98
article thumbnail

Meet the 2021 SC Awards judges

SC Magazine

He is responsible for providing policy and governance oversight and research, third-party vendor guidance, proactive vulnerability research and threat modeling services, payment card and financial systems security, and security research to IU Health and IU School of Medicine. He was also director of the SANS Internet Storm Center.

article thumbnail

Cybersecurity Culture: How Princeton University's Security Team Created It

SecureWorld News

"The IT security was being done with excellence, so we were going to leave that going while we assessed our strategy, and the operational responsibilities would come later.". Security is now a programmatic, or an automatic, part of evaluating a technology the university would like to utilize.

article thumbnail

ROUNDTABLE: Kaseya hack exacerbates worrisome supply-chain, ransomware exposures

The Last Watchdog

Here’s what they had to say, edited for clarity and length: Vikram Asnani, senior director – solution architecture, CyberGRX. Dom Glavach, CSO and chief strategist, CyberSN. Chris Clements, VP of solutions architecture, Cerberus Sentinel. Gary Phipps, VP of solution architecture, CyberGRX.