• Interview
    #<BlogSetup id: 220, owner_type: "Blog", owner_id: 1, item_type: "Article", item_id: 4951, start_date: nil, expiry_date: nil, setup_type: "slider_article", order: 1, created_at: "2019-10-17 10:55:19", updated_at: "2019-10-17 10:55:19", tag: "Interview ">
  • Cryptography
    #<BlogSetup id: 222, owner_type: "Blog", owner_id: 1, item_type: "Article", item_id: 4934, start_date: nil, expiry_date: nil, setup_type: "slider_article", order: 2, created_at: "2019-10-17 11:00:28", updated_at: "2019-10-17 11:00:28", tag: "Cryptography">
  • Interview
    #<BlogSetup id: 140, owner_type: "Blog", owner_id: 1, item_type: "Article", item_id: 4837, start_date: nil, expiry_date: nil, setup_type: "slider_article", order: 3, created_at: "2019-07-01 09:32:20", updated_at: "2019-07-01 11:18:43", tag: "Interview">
NEWSLETTERREGISTER
The most important news for free via email

Why VMware is Investing in Digital Experiences for Its Employees

Creating digital experiences that put employees first is no small task. From being able to find the right information at the right time, to collaborating with peers, to taking action in the moment, digital experiences make a big impact on how employees feel about their jobs. When you focus on creating experiences that truly empower employees, you support the people who help make your organization a success. At VMware, this isn’t only true for our customers—it’s also true for us. Learn how VMware leverages a culture of choice to build a strong, ...more

Kubernetes Demystified: What CIOs Need to Kow About the Fastest Growing Open-source Project in the World

The industry is moving fast, and all signs point to a growing trend in cloud-native technologies that boost enterprise agility, experimentation, and innovation in response to a rapidly changing business environment. Regardless of whether you have a container strategy in place, or are looking for guidance in modernizing software development processes, this executive brief breaks down the role Kubernetes plays in aligning enterprise IT and development strategies with outcomes that differentiate the business and provide new opportunities for susta ...more

2020 VMware Carbon Black Cybersecurity Outlook Report

Understanding cybersecurity comes down to understanding attacker behaviours. In this 2020 Cybersecurity Outlook Report, we use key data from cyberattacks seen over the last year to tell a clear story on how attackers are evolving and what defenders are (and should be) doing to evolve their own behaviours. ...more

CIO Essential Guidance: Intrinsic Security

Because current approaches to fighting cyberattacks are only incrementally improving results, it's time to examine intrinsic security—what it is, how it works, and its impact on the enterprise's business goals. ...more

Seven Cybersecurity Misconceptions Every CIO Should Dispel

Cybersecurity spend continues to increase, yet breaches continue to rise. What are we doing wrong? For starters, most organizations define cybersecurity practices through preventative technologies. What these approaches are often missing, however, are the basics: cyber hygiene, asset management, and protecting the data above all else. When talking to customers, we often hear 7 common myths and misperceptions around cybersecurity, which may be putting your organization at risk. In this brief, we debunk these misperceptions and advise CIOs of the ...more

Artificial Intelligence: The Smarter Approach To Information Security

The news headlines are replete with stories of devastating data breaches, compromising the personal and professional data of millions. Cyber attackers spare no industry, infiltrating the assets of even the most sophisticated technology adopters, in turn impacting their executives, employees, and perhaps worst of all — customers and users. All of which bag the question: What's going wrong? The answer lies not in changing the motives of bad actors, but rather, in the advanced techniques that help them evade traditional methods of system protec ...more

The Total Economic Impact™ Of CylancePROTECT® And CylanceOPTICS™

Employee endpoints are the interfaces between employees and the corporate data and applications they need to do their jobs. Attackers understand this — and actively target employee endpoints as well as the server endpoints hosting corporate data. More than 50% of companies experience a significant data breach each year, and endpoints, as a critical conduit for valuable corporate data, are the top targets for attack. Endpoint security solutions provide a critical line of defense, protecting PCs, laptops, and servers from malicious threats. Cy ...more

AI-Driven EDR - The Current and Future Path for More Intelligent Detection and Response

This e-book covers various topics related to artificial intelligence driven Endpoint Detection and Response (EDR). Contents: The State of Endpoint Insecurity Smarter EDR AI-Driven EDR Drives Better Business Outcomes What's AI Got To Do With It Anyway? Evaluating AI-Driven Security Solutions Choose Prevention and Detection for Superior Protection ...more

Economics of Insecurity

The information security field is economically inefficient. This is both good and bad. Bad, because it means billions of dollars are squandered on solutions which offer their buyers sub-optimal returns. Good, because the opportunities exist to operate more efficiently and thereby improve the quality of life for everyone. This paper will examine how we know economic inefficiencies exist and why the industry seems unwilling to address them. By understanding these issues, companies will be better able to select effective IT security solutions tha ...more

Replacing Legacy AV - Benefits of the BlackBerry Cylance Approach

Legacy antivirus solutions are built upon several outmoded technologies ranging from byte-matching to post execution behavioral analysis. Threat actors have adapted to these well-known cybersecurity measures and responded with increasingly sophisticated attacks. For example, using byte-matching to identify malware has been foiled by attackers implementing polymorphic, single-use, and fileless attacks. Post-execution behavioral analysis is too risky of an approach when modern ransomware may encrypt vital data before malicious activity is detecte ...more
Actual survey
Which topics are you interested in?
Social Media
DISPLAY