article thumbnail

Spotlight Podcast: How AI Is Reshaping The Cyber Threat Landscape

The Security Ledger

Jim and I talk about the findings of DirectDefense’s latest Security Operations Threat Report and dig into the intriguing ways artificial intelligence (AI) is shaping both cyberattack and defense automation strategies.

article thumbnail

Protecting your Customers and Brand in 2022: Are you doing enough?

Jane Frankland

It’s a roller coaster of a time to lead, as CIOs, CISOs and CTOs are having to deal with more users, data, devices, technologies, connectivity, mobility, regulations, risks, and threats than they care to. Cyber risks top worldwide business concerns in 2022. Post pandemic, more research has come to light.

CISO 130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

12 Top Vulnerability Management Tools for 2023

eSecurity Planet

with TruRisk is an enterprise-grade cyber risk management solution. With industry-leading vulnerability coverage, zero in on risks that matter the most. With over 450 pre-configured templates, speedily understand where you have threats. Qualys VMDR 2.0 By providing options to protect remote users, Qualys VMDR 2.0

Risk 104
article thumbnail

MY TAKE: Former NSA director says cybersecurity solutions need to reflect societal values

The Last Watchdog

Related: The golden age of cyber espionage The United States, at present, operates with a “nebulous” definition of what constitutes a cyber attack that rises to the level of threatening national security, asserts Rogers, who was commander, U.S. At a fundamental level, it comes down to more rigorously practicing cyber hygiene.