Okta co-founder and CEO Todd McKinnon outlines steps to secure enterprise SaaS, build standards with competitors, and address identity issues in generative AI apps. He also reflects on lessons from Okta’s breach and efforts to build safer products and harden the company's infrastructure.
Gil Shwed plans to step down as Check Point Software's CEO after 32 years to assume the executive chairman role. Shwed discusses his vision for AI-led cybersecurity, Nadav Zafrir’s strengths as incoming CEO, and how Check Point will navigate emerging industry challenges.
Expanding into global markets requires organizations to navigate complex and rapidly changing regulatory landscapes. Kayla Williams, CISO at Devo, shared how a collaborative approach to compliance planning helps organizations meet these challenges while accelerating growth.
In the latest weekly update, ISMG editors discussed the shooting death of the UnitedHealthcare CEO and its wider implications for AI-driven decision-making, market strategies for the top cybersecurity companies in 2025 and they are reflecting industry trends.
Remote work has created blind spots in sensitive data management across devices and locations. Data-centric encryption with granular controls helps regulated firms maintain visibility and control without hampering productivity, said Ronald Arden, executive vice president, CTO and COO at Fasoo.
In this special edition at AWS re:Invent 2024 in Las Vegas, ISMG editors discuss groundbreaking generative AI use cases transforming industries, from predictive fleet management to drug discovery, and explore how AI is reshaping user expectations in data analytics.
As software complexities grow, supply chain security is now essential to application security, according to Sandeep Johri, Checkmarx CEO. Johri discusses the challenges of malicious code, adversarial AI and the market's call for consolidated security platforms.
Predictive AI solutions can now anticipate maintenance needs before issues arise, enabling fleet operators to schedule timely repairs and prevent disruptions, said Sarvant Singh, vice president, data and emerging digital solutions at Penske Transportation Solutions.
Historically, IT and security teams have operated in silos, creating gaps in knowledge and response. Gen AI bridges this gap through natural language interfaces, enabling better communication and understanding between departments, said Druva CTO Stephen Manley.
Manual security workflows and fragmented tool visibility create operational inefficiencies and governance gaps, said Oriel Vaturi, co-founder and CEO of Ovalix. Real-time process monitoring and automation can help organizations optimize security operations and reduce risk.
David Ortiz was building websites over 20 years ago when he first become exposed to cybersecurity. Back then, his biggest worry was denial-of-service attacks. Today, as a CISO of a global company, emerging AI threats related to phishing and deepfakes are what keeps him up at night.
Cloud security demands effective management of identity risks and comprehensive visibility. Clarence Hinton of CyberArk and Oron Noah of Wiz discuss how they address cloud security challenges by combining privileged controls with advanced cloud-native solutions.
In the latest weekly update, ISMG editors discussed China outpacing the U.S. in critical technology research investments, why all 10 RSA Conference 2025 Sandbox Innovation finalists will receive a $5 million investment, and how artificial intelligence dominated the AWS re:Invent 2024 conference.
Barracuda's CIO Siroui Mushegian discusses how Barracuda uses AI and strong partnerships to deliver comprehensive cybersecurity solutions. The company builds products on AWS infrastructure, sells them through AWS Marketplace and uses AWS for internal systems.
Nation-state attackers pose a growing cybersecurity threat driven by specific geopolitical or economic objectives. These actors often target organizations with valuable data, using advanced techniques such as reconnaissance, said Ryan Roobian, global solutions architect, Google Cloud.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.asia, you agree to our use of cookies.