Spend any length of time hanging out with Okta’s in-house cyber security team and sooner or later you’re going to hear colleagues greet one another with a cheery “g’day, mate”, which is a surreal ...
Jason Nurse, reader in cyber security at the University of Kent, firmly believes the blame for cyber weaknesses needs to shift towards how systems are made rather than pointing the finger at users, ...
Artificial intelligence is compressing cyberattack timelines from months to minutes, forcing enterprises to rethink how quickly they can segment and secure their networks. While network segmentation ...
In an enlightening interview with Homeland Security Today, Jason Adolf, Global Head of the Public Sector at Appian, delved into the advancements and integration of Artificial Intelligence (AI) within ...
Is your security bolted-on or built-in? Fortinet's John Maddison discusses how to future-proof your network. When implementing a cybersecurity platform in your organization, it’s important to think of ...
Director of Internet Analysis Doug Madory joins DCD's Zoe Turner to discuss the impact of outages and vulnerabilities of our Internet. DCD's Jason Ma speaks to Steven Tisseyre of Aerial Defence, ...
Five years after ETSI set a new baseline for IoT security, connected devices now operate across increasingly distributed enterprise and infrastructure environments. IoT security is no longer only ...
Military commanders need hubs of technology to understand the masses of information with which they are presented. The insider threat a is a real concern for planners in operational security, who rely ...
Ben Fathi knows a thing or two about security. He spent the first half of his 24-year career working as an operating system developer, before moving to management. Before being named head of Microsoft ...
The pickings are slim in the job market and the time line of interviewing and then hiring new people is slow. But there are positions available in the security field, according to three veteran ...