article thumbnail

SOC modernization: 8 key considerations

CSO Magazine

We are at a point where the scale and complexity of historical security defenses either aren’t working or are stretched to their limits. This means CISOs need to think about security transformation, and as they do, every process and layer of the security technology stack is in play.

CISO 86
article thumbnail

Creating a Path to Successful Security Hygiene

Cisco Security

There’s a growing need to secure the perimeter while simplifying the technologies that do so. New security approaches like SASE, XDR and zero trust have gained centerstage with the accelerated pace of digital transformation that bring down the walls between siloed security technologies.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Healthcare Cyberattacks Lead to Increased Mortality, Lower Patient Care: Ponemon Study

eSecurity Planet

Ponemon chairman and founder Larry Ponemon said in a statement that “Most of the IT and security professionals regard their organizations as vulnerable to these attacks,” and that growing adoption of technologies such as cloud, mobile , big data , and the Internet of Things (IoT) are adding to that risk.

article thumbnail

Cybersecurity Mergers Flatline. Here’s Why That Won’t Last.

eSecurity Planet

Much like the rest of technology, merger and acquisition (M&A) activity for cybersecurity companies has been in a slump this year. Changes in Customer Spending to Align Security Stacks Another factor in favor of renewed M&A for cybersecurity startups is changing customer spending priorities.

article thumbnail

Easier Management with Integrated Endpoint Security

McAfee

BizTech explores technology and business issues that IT leaders and business managers face when they’re evaluating and implementing solutions. EDR Becoming an Integral Component of Endpoint Security. All the companies interviewed by Gilhooly affirm the importance of EDR in their security defense.

CISO 40
article thumbnail

5 Major Cybersecurity Trends to Know for 2024

eSecurity Planet

Government actions will increase: Expect more government regulations, state-sponsored cyberattacks, and increased documentation required to protect CISOs. AI Use Danger As with any emerging technology, many organizations should expect errors and growing pains as teams learn the nuances of applying the technology.

article thumbnail

Black Hat USA 2021 – Top 5 Sessions to Attend & Tips to Survive Now that Conferences are Back In-Person

Security Boulevard

Ami Luttwak | Co-Founder & Chief Technology Officer, Wiz.io. Tracks : Cloud & Platform Security, AppSec. James Coote | Senior Consultant, F-Secure Consulting. Alfie Champion | Senior Consultant, F-Secure Consulting. Tracks : Network Security, Defense.

CISO 40