All enterprises need to grant their employees access to the right digital and physical resources. They also need to digitize their businesses, protect their data, and comply with various local and global regulations.
Nexus helps resolve these identity challenges that most enterprises face, regardless of the...
As part of healthcare's digital transformation, payers and providers alike have rolled out patient portals and telemedicine platforms to increase access to care, improve patient participation and decrease healthcare administrative costs.
How secure are these portals? What types of authentication protocols are used to...
ISMG and Fortinet hosted a roundtable dinner in Atlanta on May 7 focused on "Outmaneuvering Threat Actors in the Age of Industrial IoT (IIoT)". Challenges in communication and gaining buy in from operational teams for security initiatives were explored, and Richard Peters, Director, Operational Technology Global...
ISMG and Fortinet hosted a roundtable dinner in Nashville, TN on May 15 focused on "Securing the Digital Enterprise". Challenges in gaining internal buy in for security initiatives and the problems of M&A activity were discussed, and Sonia Arista, National Healthcare Lead of Fortinet provided her insight on the event...
For more than a decade, Christy Wyatt was immersed in mobile security - most recently as CEO of Good Technology. Now she has re-emerged as CEO of Dtex Systems. What new challenges does this role pose to the veteran security and technology leader?
As Art Gilliland, CEO of Skyport Systems, assesses cybersecurity in 2016, he sees distinct strengths, weakness and opportunities for the next generation of leaders. The question is: Where will we find these leaders?
He'd spent nearly 15 years in information security, then realized we needed to change our fundamental approach. Why did Art Gilliland, CEO of Skyport Systems, bet his career on this notion? And how is it paying off?
Dick Williams, CEO of digital security firm Webroot, says the cybersecurity profession needs more than just technical experts. Learn why he says firms will seek out those who can understand the behaviors of cyber-attackers.
Art Coviello is retiring after 20 years with RSA. How does the company chairman size up the state of information security? "Precarious at best." Hear his top concerns and his advice to the next generation of security leaders.
RSA President Amit Yoran's focus is on refining RSA's vision, growth strategy and emerging technology. A key consideration in honing that strategy: the rise and pervasiveness of advanced threat actors.
When Todd Davis helped found LifeLock in 2005, ID fraud was a niche consumer issue. Today it's a major enterprise risk. What are today's top fraud threats, and where are some of the surprising security gaps?
When IT veteran Branden Spikes founded his own company devoted to isolating browsers from attacks, he thought building the technology would be the top challenge. The venture capital community proved him wrong.
The CEO of Bit9 speaks from experience: His firm was hacked, sensitive data stolen and customers put at risk. And what's happened since represents his mission to fend off attackers, even as they refine their hacks.
Technologies that allow companies to analyze cyberthreats are evolving and soon should provide better intelligence to mitigate attacks, says Jim Anderson, a president at BAE Systems Applied Intelligence.