Spend any length of time hanging out with Okta’s in-house cyber security team and sooner or later you’re going to hear colleagues greet one another with a cheery “g’day, mate”, which is a surreal ...
Artificial intelligence is compressing cyberattack timelines from months to minutes, forcing enterprises to rethink how quickly they can segment and secure their networks. While network segmentation ...
In an enlightening interview with Homeland Security Today, Jason Adolf, Global Head of the Public Sector at Appian, delved into the advancements and integration of Artificial Intelligence (AI) within ...
Jason Nurse, reader in cyber security at the University of Kent, firmly believes the blame for cyber weaknesses needs to shift towards how systems are made rather than pointing the finger at users, ...
Is your security bolted-on or built-in? Fortinet's John Maddison discusses how to future-proof your network. When implementing a cybersecurity platform in your organization, it’s important to think of ...
Military commanders need hubs of technology to understand the masses of information with which they are presented. The insider threat a is a real concern for planners in operational security, who rely ...
Director of Internet Analysis Doug Madory joins DCD's Zoe Turner to discuss the impact of outages and vulnerabilities of our Internet. DCD's Jason Ma speaks to Steven Tisseyre of Aerial Defence, ...
Ben Fathi knows a thing or two about security. He spent the first half of his 24-year career working as an operating system developer, before moving to management. Before being named head of Microsoft ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results