By collecting, analyzing, and leveraging data from security events, security analytics empowers teams to proactively detect anomalies and pinpoint vulnerabilities to mitigate targeted attacks, insider threats, and advanced persistent threats (APTs).
Adam Geller discusses his shift from Exabeam CEO back to product leadership at Zscaler, where he plans to use the company's vast data insights and security operations to drive growth. Geller emphasizes the importance of CXO-level visibility and robust customer adoption strategies.
The “Three Pillars” (people, process, and technology) management framework requires a delicate balance in order to achieve successful operations outcomes. Despite the ‘technology’ pillar dominating the conversation as of late, cybersecurity practitioners are the backbone of your organization's defense against...
Huntress CTO Chris Bisnett outlines the firm's innovative approach to simplifying SIEM by reducing data storage costs and focusing on relevant logs. These services support small and midsized businesses looking to enhance their security posture without the high expenses of a traditional SIEM.
Cohesity CEO Sanjay Poonen discusses how the acquisition of Veritas will drive innovation in data protection, using AI for better insights and customer satisfaction. He shares plans to use AI technology for data insights and expand the firm's market share, especially within the Fortune 100.
As cybersecurity teams build their incident response plans, the first question they usually ask is, "How can I find the data that's out there?" Faced with third-party supply chain issues and shadow IT, CISOs are struggling with answering that question, said Rubrik's Jason Pope.
As conversations around the intersection of AI and cybersecurity continue to intensify, CISOs are voicing their top concerns regarding the use of generative AI, data protection and regulatory governance, said Herain Oberoi, general manager, Microsoft Security.
Sébastien Cano, senior vice president for cloud protection and licensing at Thales, discusses Thales' strategic acquisition of Imperva, the pillars of data security and its evolving landscape, and the need for vendor consolidation and platform solutions.
Executive Vice President and General Manager Jeetu Patel explains how Cisco's $28 billion acquisition of Splunk will transform the company's security practice to bring in advanced AI, improve data analysis and streamline operations for a stronger defense against cyberthreats.
A data security firm led by a former CA Technologies executive raised $60 million to boost both organic and inorganic expansion around data and compliance. The round will build on the firm's new data hygiene tool as well as its new controls for detecting and tracking model access to sensitive data.
Organisations are dealing with an unprecedented rate of technology-driven disruption, that is reshaping how business is conducted, how financial services function and what customers expect.
So, how do you future-proof your business to thrive amidst these expectations? The key is enterprise decisioning. Build digital...
Organisations are dealing with an unprecedented rate of technology-driven disruption, that is reshaping how business is conducted, how financial services function and what customers expect.
So, how do you future-proof your business to thrive amidst these expectations? The key is enterprise decisioning. Build digital...
French IT firm Atos has confirmed it is in early-stage talks with Airbus to sell its cybersecurity unit for an estimated 1.8 billion euros, or 1.79 billion. The latest Airbus offer comes just six months after Airbus' unsuccessful bid for a minority stake in Atos Evidian.
A large, Seattle-based surgical group is notifying nearly 437,400 individuals that their information was potentially compromised in a ransomware and data theft incident earlier this year. The breach is part of a larger, disturbing trend in the healthcare sector in 2023.
Digital transformation (DX) is driving the convergence of IT and OT networks, as organizations seek to reduce costs, increase productivity, and gain or maintain a competitive advantage. This convergence is enabling the integration of networking and digital communications into OT environments, as well as the use of...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.asia, you agree to our use of cookies.