End-users can be the weakest link in your infosec defense. But according to KnowBe4 founder and CEO Stu Sjouwerman, there is something you can do about that - if you implement the right behavioral diagnostics and focus your training needs on individual...
To cope with today's fileless endpoint attacks - especially those that aren't precisely similar to previously known exploits - Tomer Weingarten and Nicholas Warner of SentinelOne suggest a unified EPP/EDR approach that includes visibility into the dang...
Aggressive cloud adoption increases threat surface and makes it more difficult for infosec teams to keep track of what the business is doing. Donald Meyer, Head of Data Center and Cloud at Check Point Software, explains how infosec teams can more effec...
Bill Mann, Chief Product Officer at Centrify, suggests some strategies for securing today's perimeter-less enterprise environments - including stronger enforcement of well-defined policies for user access, integration of security into DevOps processes,...
Allan Liska, Senior Security Architect at Recorded Future, believes everyone in the infosec team - including vulnerability management and threat response staff - can take greater advantage of available threat intelligence to more effectively and effici...