Ask the Experts
Ask the Experts
Cybersecurity strategy
-
What role does machine learning play in the threat hunting process?
Fidelis Cybersecurity president and CEO Nick Lantuh discusses threat hunting best practices, including machine learning's role in corporate data protection. Continue Reading
-
How can enterprises benefit from automation in security?
Tufin Technical Director Joe Schreiber highlights how automating security operations can benefit an organization and discusses best practices for effective implementation. Continue Reading
-
How can companies protect against ransomware in the cloud?
When it comes to ransomware attacks, cloud storage is not foolproof. CyberSight's Hyder Rabbani offers tips about how to address cloud ransomware threats. Continue Reading
-
Best practices for cloud security: Be cognizant of what's in the cloud
In this Ask the Expert, Booz Allen Hamilton's Anil Markose offers the cloud security best practices organizations need to protect their cloud information. Continue Reading
-
How do attackers build and use phishing kits?
With attackers looking to maximize their ROI, they are employing what is called a phishing kit to run scam campaigns. In this Ask the Expert, learn how such kits are built. Continue Reading
-
How can the CISO become a business enabler?
For a cybersecurity program to be effective, CISOs must be viewed as business enablers. Kudelski Security's John Hellickson offers tips on how CISOs can make the transformation. Continue Reading
-
Is end user training essential to data loss prevention program success?
Regulations like the GDPR promise to enforce stricter data protection rules. While a data loss prevention program can help, it requires end-user training to ease adoption. Continue Reading
-
Tech vs. training: Where should business focus cybersecurity spending?
As information security budgets grow, cybersecurity spending needs to be focused on employee-centric areas like training to be effective. ISSA's Candy Alexander explains why. Continue Reading
-
More potential attack vectors complicate wearable device security
To ensure wearable device security, organizations can no longer get by with aged approaches, said Boeing's Brian Laughlin. Continue Reading
-
Will IaaS offerings look radically different by 2016?
In this Ask the Expert, IDC analyst Rick Villars explains why 75% of IaaS provider offerings will be redesigned or phased out over the next year. Continue Reading
-
What's the difference between an outsourcing agreement and a service-level agreement?
What's the difference between an outsourcing agreement and a service-level agreement? If they are different, what are the defining elements of each? Continue Reading
-
What’s the top ERP solution for insurance companies?
Looking for ERP solutions to meet the unique needs of an insurance company can be challenging, but you’ll find some ideas in this expert tip. Continue Reading