Josh Corman: Securing the Healthcare Industry - a Digital Upgrade for the Hippocratic Oath

Josh Corman: Securing Healthcare – a Digital Upgrade for the Hippocratic Oath

Hospitals and medical device manufacturers are years behind when it comes to online security. But working together with the FDA and the medical device community, Josh Corman of cyber-safety grassroots organization ‘I Am the Cavalry’ is on a mission to fix that ... Read More
Gene Spafford: Challenging the Maxim, “No Security Through Obscurity”

Gene Spafford: Challenging the Maxim, “No Security Through Obscurity”

Gene Spafford challenges the notion many security people have that there’s no security through obscurity. “Being deceptive can increase the workload and frustrate attackers, but it’s not a perfect defense all by itself,” warns Spafford. “You can get additional security through obscurity or through deception. But it shouldn’t be your ... Read More
Dwayne Melancon: How Machines and Security Staff Can Learn From Each Other

Dwayne Melancon: How Machines and Security Staff Can Learn From Each Other

The ability to analyze overwhelming amounts of data very quickly is one of the top benefits of using machine learning within a business or organization, says Dwayne Melancon, Tripwire's Chief Technology Officer. He has some advice for any organizations who haven’t yet started using machine learning to make employees lives ... Read More
Art Coviello: The Era of Machine Learning and 'Thinking Security'

Art Coviello: Thinking Security in the Era of Machine Learning

We’ve hit an inflection point where data, storage, and computing power can finally take full advantage of machine learning and artificial intelligence. Art Coviello, former Executive Chairman of RSA, discusses the future of machine learning in the world of security ... Read More
Robb Reck: Embedding Security Throughout the Organization

Robb Reck: Embedding Security Throughout The Organization

Security has to be part of everyone’s job. But security doesn’t become everyone’s job just because the CISO has said so. The only way security can grow within an organization is if it is embedded in the technology environment you’re deploying, explains Robb Reck, CISO of Ping Identity. That’s the ... Read More
Scott Borg: Financial Markets Are Prime Targets For The Next Big Cyberattack

Scott Borg – The Next Big Cyberattack: Our Financial Markets

A combination of physical attacks and cyberattacks to force instability in financial markets could become an enormous financial boon for organized crime and nation state assaults – so says Scott Borg, Director of the U.S. Cyber Consequences Unit ... Read More