This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Now toss in the fact that digitaltransformation is redoubling software development and data handling complexities. Demisto launched in May 2016. LW: How has ‘digitaltransformation’ exacerbated the need for SOAR? Sutton: Digitaltransformation is a big driver for SOAR.
I had the chance to sit down with their CISO, Dave Stapleton, to learn more about the latest advancements in TPRM security solutions. CyberGRX launched in 2016 precisely because bespoke assessments had become untenable. Digitaltransformation had taken hold; so their timing was pitch perfect. -based CyberGRX.
In 2016, Jay Leek – then CISO at the Blackstone investment firm, and now a CyberGRX board member — was collaborating with CSOs at several firms Blackstone had invested in when a common theme came up. For a full drill down, please listen to the accompanying podcast. The key takeaways: Rise of third parties.
We made a conscious decision to focus on market education starting from our founding in 2016. In this new guide, we take a close look at the special challenges CISOs face with increasing API usage and evolving security requirements. Digitaltransformation has driven unparalleled business opportunities. Runtime protection.
» Related Stories Spotlight Podcast: QOMPLX CISO Andy Jaquith on COVID, Ransomware and Resilience Spotlight Podcast: RSA President Rohit Ghai warns DigitalTransformation is magnifying Enterprise Risk Ahead of Black Hat: Fear and Pessimism in Las Vegas. Read the whole entry. »
The scaling of the cybersecurity landscape and organizations’ digitaltransformation projects drove the need for more significant cybersecurity investment priorities. I had the displeasure of meeting a global hacker during a trip to Taiwan in 2016. Meeting A Cybercriminal — In Person. How he got there, I have no idea.
The advent of CI/CD, DevOps, and DigitalTransformation has rendered application security testing 1.0 In 2016, the best minds were challenged with the question: how do we scale application security at modern internet speeds and modern developer scale? It truly is the future of application security.
Rogers made his remarks as part of a panel discussion on securing digitaltransformation moderated by Infosys CISO Vishal Salvi. It was a wide-ranging, eye-opening discussion. Here are a few key takeaways I came away with: Rising cyber exposures Enterprises today are engaged in a struggle to balance security and agility.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content