Remove CISO Remove Energy and Utilities Remove Technology Remove Threat Detection
article thumbnail

2022 Cybersecurity predictions

CyberSecurity Insiders

In 2022, we will see 5G go from new technology to a business enabler bringing previously unimaginable use cases because of its high bandwidth and lower latency. Data from the current AT&T Cybersecurity Insights Report shows that 5G technology is being driven by the line of business and has been siloed between IT and OT organizations.

article thumbnail

Meet the 2021 SC Awards judges

SC Magazine

With a career spanning two decades as a technology provider to businesses and government agencies, Levine brings a strategic and pragmatic approach to building secure software and cloud services without disrupting product velocity. Todd Bell serves as the chief information security officer and executive director at Valleywise Health.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

5 Major Cybersecurity Trends to Know for 2024

eSecurity Planet

Government actions will increase: Expect more government regulations, state-sponsored cyberattacks, and increased documentation required to protect CISOs. AI Use Danger As with any emerging technology, many organizations should expect errors and growing pains as teams learn the nuances of applying the technology.

article thumbnail

CSTA Turns 400 – Proof That Technology Integrations Is Exactly What You Are Looking For

Cisco Security

With the addition of Kenna Security into our program we now have over 250 technology partners and over 400 integrations for our mutual customers to utilize. An integration with Cigent Technology is now available for Secure Endpoint customers to integrate with. Kenna has a healthy 3rd Party ecosystem of technology partners.

article thumbnail

How to Select the Right MDR Service

Security Boulevard

Former Medallia VP of Cloud Security and current Chief Information Security Officer (CISO) at Inspectiv , Ray Espinoza , has spent over 15 years working in security information management. But after more than two decades, they’ve become a bottleneck to effective threat detection. Threat hunting. Ask the Expert.

article thumbnail

Cybersecurity Risks of 5G – And How to Control Them

eSecurity Planet

5G technology will improve some IoT use cases, thereby adding to the proliferation of IoT devices – a phenomena individuals and organizations aren’t prepared to fully defend in the immediate future. ” One such threat posed for 4G that remains a source of concern for 5G is rogue base station (RBS) threats.

Risk 126