article thumbnail

Spotlight Podcast: Security Automation is (and isn’t) the Future of Infosec

The Security Ledger

We talk about the growing demand for security automation tools and how the chronic cyber security talent shortage in North America and. pool party in 2019 might have young Benjamin being advised to look into “AI” – artificial intelligence. Read the whole entry. » That same L.A.

article thumbnail

Spotlight Podcast: RSA CTO Zulfikar Ramzan on confronting Digital Transformation’s Dark Side

The Security Ledger

In this Spotlight Edition of the podcast we're speaking with RSA Chief Technology Officer Zulfikar Ramzan about how his company is adapting to help its customers confront the dark side of digital transformation initiatives: increased digital risk, including from cloud, artificial intelligence and the Internet of Things.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Global Cybersecurity Skills Gap Still Widening Despite Growing Workforce

SecureWorld News

With technological innovations like cloud computing, AI/ML, the Internet of Things, and more making cyber risks even more complex, qualified talent is hugely in demand. Building the deeper skills needed in areas like cloud security and Artificial Intelligence is extremely difficult in this environment.

article thumbnail

Inside the Complex Universe of Cybersecurity

SecureWorld News

Working as CISO, DeSouza's areas of expertise include strategic planning, risk management, identity management, cloud computing, and privacy. Notably, artificial intelligence (AI) emerges as a double-edged sword. Real-world conflicts cast shadows that significantly amplify cyber risks.

article thumbnail

The 11 Best GRC Tools for 2024

Centraleyes

T is for Transparency Accountability for risk and compliance is a growing trend worldwide, especially at the board level. Offering streamlined workflows, automated evidence collection, and quantification of risks, LogicGate enables efficient risk assessment and communication.

Risk 52
article thumbnail

Top Breach and Attack Simulation (BAS) Vendors

eSecurity Planet

Breach and attack simulation (BAS) is a relatively new IT security technology that can automatically spot vulnerabilities in an organization’s cyber defenses, akin to continuous, automated penetration testing. DXC Technology has over 40 years of infosec experience, most of which as HPE’s Enterprise Services. DXC Technology. SafeBreach.