As 5G gains traction, service providers need to be able to trust their networks’ security to truly take advantage of 5G’s capabilities. Digital certificates are critical to that, writes Alexa Tahan of Nokia.
In this Expert Insight, Jeffrey Wheatman, the Cyber Risk Evangelist at Black Kite, says that CISOs need to shift their approach: becoming more proactive in working to preventing ransomware attacks. And he provides some steps CISOs can take to ensure their companies stay safe.
When it comes to measuring the security level of a device, a checklist of security ‘low hanging fruit’ is a good place to start. But more is needed, says Mike Sheward of Particle.io
In this Expert Insight, Jack Naglieri, the CEO of Panther, writes about how today’s cloud-centric and data-driven environments make the SIEM technologies of the past inadequate and demand new approaches to security monitoring.
Massive growth in Zoom’s customer base as a result of the COVID 19 pandemic brought new business – but also new challenges and security requirements. Establishing a CISO Council gave those customers a voice and a seat at the table, writes CISO Jason Lee.