newsOrganizations with outdated security approaches getting hammered: CloudflareA new report suggests that DDoS attacks continue to increase in number and that web apps and APIs remain vulnerable spots that security teams can’t keep up with.By Paul Barker25 Jun 20244 minsInternet SecuritySecurity PracticesSecurity Infrastructure opinion Bootstrapping: The best AI strategy is to avoid learning today’s AI techBy Christopher Whyte17 Jun 202410 minsSecurity InfrastructureSecurity Practicesfeature Top 10 physical security considerations for CISOsBy Ericka Chickowski23 Apr 202414 minsCritical InfrastructureSecurity InfrastructureSecurity featureWhat is identity fabric immunity? Abstracting identity for better securityBy Matthew Tyson 03 Apr 202411 minsCSO and CISOApplication SecurityIdentity and Access Management featureTeams, Slack, and GitHub, oh my! – How collaborative tools can create a security nightmareBy Susan Bradley 19 Mar 20247 minsWindows SecurityApplication SecurityCloud Security featureCyber Trust Mark concept gains momentum with smart device and IoT manufacturersBy Chris Hughes 06 Feb 20249 minsSecurity HardwareComplianceSecurity Practices newsAI enters production systems even as ‘trust’ emerges as a growing concernBy Shweta Sharma 14 Dec 20234 minsGenerative AISecurity Infrastructure newsAI dominates cybersecurity megatrends for 2024: Report By Shweta Sharma 13 Dec 20234 minsGenerative AISecurity Infrastructure featureHow to maintain a solid cybersecurity posture during a natural disasterBy James Careless 30 Nov 20238 minsSecurity Operations CenterData and Information SecuritySecurity Practices ArticlesnewsNetRise releases Trace solution with AI-powered semantic search aimed at protecting firmwareThe platform analyzes XIoT firmware using large language model capabilities to follow compromised or vulnerable assets back to their source.By Andrew Flynn 09 Nov 2023 3 minsInternet SecuritySecurity Monitoring SoftwareSecurity PracticesfeatureSecure from the get-go: top challenges in implementing shift-left cybersecurity approachesAn approach that builds cybersecurity into software and platforms can create stronger security, reducing vulnerabilities and risks. But implementation often comes with challenges. By Mary K. Pratt 07 Nov 2023 12 minsDevSecOpsSecurity PracticesSecurity InfrastructurenewsFIDO Alliance certifies security of edge nodes, IoT devices Certification demonstrates that products are at low risk of cyberthreats and will interoperate securely.By Michael Hill 27 Sep 2023 3 minsCertificationsInternet SecuritySecurity HardwarefeatureWhat’s a cyber incident response retainer and why do you need one?Whether you need to hire a team to respond to any and all cyberattacks or just some hired guns to boost your capabilities, incident response retainers can ensure you’re covered.By Linda Rosencrance 27 Sep 2023 8 minsCyberattacksIncident ResponseSecurity PracticesopinionViews of a hot cyberwar — the Ukrainian perspective on Russia’s online assaultA report from Ukraine’s cybersecurity service reveals insight into what the country has been facing from belligerent attackers and holds a lesson for CISOs.By Christopher Burgess 04 Apr 2023 5 minsData and Information SecuritySecurity InfrastructureSecurity PracticesopinionTransparency and policy shapes Cloudflare’s Kiwi Farms decisionsCloudflare's blocking of hate-based forum Kiwi Farms is the latest in a string of controversial actions and inactions around bad behaving customers. Agree or disagree, the company has stuck to its policy throughout.By Christopher Burgess 06 Sep 2022 5 minsSecurity InfrastructureSecuritynews analysisNIST CSF 2.0 Workshop emphasizes global appeal, metrics and assessmentAbout 7,000 international workshop attendees heard discussion on NIST's plan to update its Cybersecurity Framework to incorporate more guidance on supply chain security, measurement, and implementation, among other topics.By Cynthia Brumfield 18 Aug 2022 8 minsIT Governance FrameworksSecurity InfrastructurenewsSnowflake offers cybersecurity data platform with security app integrationsSnowflake's cybersecurity workload integrates the company's data cloud, storage and query features with tools from cybersecurity vendors, for enhanced threat detection, investigation and alerts.By Shweta Sharma 09 Jun 2022 3 minsData WarehousingSecurity InfrastructureCloud Computingfeature7 top challenges of security tool integrationWith organizations using as many as 100 security tools, getting them to work well together is an ongoing battle. These are the most common pitfalls of security tool integration.By Bob Violino 08 Feb 2022 6 minsNetwork SecuritySecurity Infrastructurefeature6 risk factors to know when hiring an MSSPA managed security services provider can effectively extend an organization's security capabilities or provide affordable security infrastructure if you avoid these common mistakes.By Jaikumar Vijayan 13 Aug 2021 9 minsSecurity InfrastructureSecurityfeatureHow to reboot a broken or outdated security strategyCISOs talk about how they identify when they need a new security strategy and the process of developing it and selling the reboot to stakeholders.By John Edwards 18 Jan 2021 8 minsSecurity InfrastructureSecurityfeature4 key benefits of NOC/SOC integration and tips for making it workCompanies that have started the SOC/NOC integration process report improved security and operational efficiencies, but had to overcome technical and cultural challenges. By Neal Weinberg 14 May 2020 8 minsNetwork SecuritySecurity InfrastructureSecurity Show more Show less View all Resources whitepaper XSIAM E-Book: Machine-Led, Human-Empowered Platform The proliferation of applications, workloads, microservices and users is quickly expanding the digital attack surface. It’s generating vast amounts of data faster than you can detect and protect. The post XSIAM E-Book: Machine-Led, Human-Empowered Platform appeared first on Whitepaper Repository –. By Palo Alto Networks 11 Jul 2024SecuritySecurity InfrastructureSecurity Operations Center whitepaper XSIAM: 5 Steps SOC Transformation Guide By Palo Alto Networks 11 Jul 2024SecuritySecurity InfrastructureSecurity Operations Center View all Podcasts podcastsCSO Executive Sessions: IndiaHost Qiraat Attar, content strategist for Foundry India, interviews top chief information security officers throughout India to discuss current security threats, critical IT projects, security skills and careers, and much more.5 episodesApplication SecurityCloud Security Ep. 05 CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) 17 Jul 202417 mins CSO and CISO Ep. 04 CSO Executive Session India with Charanjit Bhatia, Head of Cybersecurity, COE, Bata Brands 08 Jul 202418 mins CSO and CISO Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos feature How to ensure cybersecurity strategies align with the company’s risk tolerance By Rosalyn Page 03 Sep 202410 mins CSO and CISORisk Management news North Korean hackers actively exploited a critical Chromium zero-day By Shweta Sharma 02 Sep 20243 mins Zero-day vulnerability feature Ransomware recovery: 8 steps to successfully restore from backup By Maria Korolov 02 Sep 202417 mins RansomwareMalwareBackup and Recovery podcast CSO Executive Sessions: Guardians of the Games – How to keep the Olympics and other major events cyber safe 07 Aug 202417 mins CSO and CISO podcast CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) 17 Jul 202417 mins CSO and CISO podcast CSO Executive Session India with Charanjit Bhatia, Head of Cybersecurity, COE, Bata Brands 08 Jul 202418 mins CSO and CISO video CSO Executive Sessions: Guardians of the Games – How to keep the Olympics and other major events cyber safe 07 Aug 202417 mins RansomwareZero TrustCloud Security video CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) 17 Jul 202417 mins CSO and CISO video Cybersecurity Insights for Tech Leaders: Addressing Dynamic Threats and AI Risks with Resilience 10 Jul 202424 mins CSO and CISO