Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Penetration Testing ROI: How to Convince Leadership to Invest in Cybersecurity

While Chief Information Security Officers (CISOs) know how crucial a consistent enterprise penetration testing program is to their cybersecurity program, convincing their fellow leaders and board members to invest in pen testing amid other budget demands can be challenging. The key is to speak to these leaders in terms they readily understand, focusing largely on risk.

CISO Liability: Why Managing Breaches Matters More Than Stopping Them

How can CISOs protect themselves from liability? Today’s security leaders must focus on breach response, not just prevention. This clip explores why CISOs are increasingly being held accountable for cyber incidents and how to shift towards strategic risk management.

The Cost of Being a CISO Part 2: Ethics, Leadership and Strategic Impact

Welcome back to Razorwire! I'm your host, Jim, and in this second part of our CISO Dilemmas series, we welcome back security experts Oliver Rochford and Richard Cassidy. Moving beyond the challenges covered in part one, this episode explores the rewarding aspects of the role while taking a frank look at the ethical issues security leaders regularly face. The guests share personal experiences and practical actions for transitioning from technical expertise to strategic leadership, building effective teams and managing relationships across the business.

Demo: Tanium Autonomous Endpoint Management (AEM) in action

This end-to-end demo of Tanium AEM will guide you through the foundational automated capabilities of the Tanium platform. Tanium AEM leverages real-time insights from all Tanium cloud-managed endpoints to recommend and automate changes on endpoints within a customer’s environment in a safe, scalable way with its real-time platform. It empowers IT and Security teams to confidently and efficiently scale operations and improve the security posture of the environment.

What Is CTEM? Understanding Gartner's CTEM Framework

In the world of cybersecurity, nothing stays still for long. The endless proliferation of new technologies and rapidly shifting threat landscapes forces organizations to continually reevaluate their approach to risk. Over the last two decades, security teams have leaned heavily on vulnerability management (VM) solutions to identify, classify, and patch software vulnerabilities on internal assets.

Simplify your SIEM migration to Microsoft Sentinel with Datadog Observability Pipelines

As cyberattacks rise in number and sophistication, many CISOs are pushing their organizations to adopt modern SIEM solutions to better monitor and investigate threats to their applications and infrastructure. Enterprises with a large Microsoft Azure or Windows-based footprint in particular are increasingly eyeing Microsoft Sentinel to consolidate their security stack and workflows.

Europe Retail Threat Landscape 2024

As one of the world’s largest and most advanced economic regions, the European region consists of 37 countries including the 27 European Union (EU) countries. With some of the most important economies in the world, Europe remains a prime target for cyber adversaries and state actors. The retail industry faces a constantly evolving array of threats among its major sectors.