Remove Artificial Intelligence Remove Cyber Risk Remove InfoSec Remove Technology
article thumbnail

Spotlight Podcast: Security Automation is (and isn’t) the Future of Infosec

The Security Ledger

We talk about the growing demand for security automation tools and how the chronic cyber security talent shortage in North America and. In this podcast, we talk about the growing demand for security automation tools and how the chronic cyber security talent shortage in North America and elsewhere is driving investment in automation.

article thumbnail

Spotlight Podcast: RSA CTO Zulfikar Ramzan on confronting Digital Transformation’s Dark Side

The Security Ledger

In this Spotlight Edition of the podcast we're speaking with RSA Chief Technology Officer Zulfikar Ramzan about how his company is adapting to help its customers confront the dark side of digital transformation initiatives: increased digital risk, including from cloud, artificial intelligence and the Internet of Things.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Global Cybersecurity Skills Gap Still Widening Despite Growing Workforce

SecureWorld News

With technological innovations like cloud computing, AI/ML, the Internet of Things, and more making cyber risks even more complex, qualified talent is hugely in demand. Building the deeper skills needed in areas like cloud security and Artificial Intelligence is extremely difficult in this environment.

article thumbnail

Inside the Complex Universe of Cybersecurity

SecureWorld News

Working as CISO, DeSouza's areas of expertise include strategic planning, risk management, identity management, cloud computing, and privacy. Notably, artificial intelligence (AI) emerges as a double-edged sword. Zero Trust is a coalition of multiple People, Process & Technology safeguards that also help strengthen privacy.

article thumbnail

The 11 Best GRC Tools for 2024

Centraleyes

R is for Real-Time Risk Improved real-time risk monitoring and identification capabilities using modern technologies, including alerts and notifications, allow faster response to a dynamic threat landscape. T is for Transparency Accountability for risk and compliance is a growing trend worldwide, especially at the board level.

Risk 52
article thumbnail

Top Breach and Attack Simulation (BAS) Vendors

eSecurity Planet

Breach and attack simulation (BAS) is a relatively new IT security technology that can automatically spot vulnerabilities in an organization’s cyber defenses, akin to continuous, automated penetration testing. DXC Technology. DXC Technology. SafeBreach holds multiple patents and awards for their BAS technology.