Women in Security Awards 2019: Do you find the cybersecurity industry to be...
Vox pop interviews live at the Women in Security Conference & Awards 2019.
View ArticleSecurity Leader: Michael Christie, F5 Networks
"Connecting the people and technology is all made possible when an effective process is established for DevSecOps."
View ArticleSecurity Leader: Nick Lennon
"With the volume of threats increasing so substantially and approaches changing so rapidly, perhaps the biggest risk is that the event that will happen in 12 months’ time isn’t even on our radar yet."
View ArticleSecurity Leader: Ryan Weeks, Datto
I spend more time talking to customers than I ever have before, and carve out time to embed myself in their organisations to understand their challenges at a deeper level.
View ArticleSecurity Leader: Richard Gerdis, Delphix
"Data is concurrently our biggest opportunity, and our biggest threat, and therefore should remain our greatest priority."
View ArticleCSO interviews Jeff Hawn on Quest Software and OneIdentity
A CSO Event: Digital transformation is hard-but preventing access abuse can be even harder.
View ArticleCSO interviews Boris Ivancic, Quest Software and OneIdentity Vice President...
A CSO Event: Digital transformation is hard-but preventing access abuse can be even harder.
View ArticleCSO interviews OneIdenty David Earhart
Active directory has been around for a while and is now a foundational service. Is its importance underestimated?
View ArticleCSO interview with Michael Tweddle, President and General Manager of Platform...
Active directory has been around for a while and is now a foundational service. Is its importance underestimated?
View ArticleCSO Webinar: Finally fire your firewall for segmentation
If you’d like to simplify your segmentation and replace cumbersome data centre firewalls with something faster, safer and more cost effective watch CSO Australia and Illumio on this webinar where you...
View ArticleSecurity Leader: Keith Marlow, ELMO Software
"I believe security teams in SaaS businesses like ours have two sets of stakeholders or users: employees and external clients"
View ArticleSecurity Leader: MJ Salier, Verizon
I am passionate about technology. I love the way the internet and communication platforms have made it possible to achieve so much in our society. This can be great, and it can be destructive, but it’s...
View ArticleSecurity Leader: Clinton Shiels, Brennan IT
"Having an understanding of where the threat is and where it has come from is critical to provide the ability to isolate or shutdown the network connection of an infected device before it spreads."
View ArticleSecurity Leader: Glen Maloney, ExtraHop
"With so much potential money available, cyberattacks are becoming increasingly sophisticated, and this trend is not going to change anytime soon."
View ArticleSecurity Leader: Rob Dooley, VMware Carbon Black
"Effective CISOs need to understand technology and risk but most importantly have strong relationship skills."
View Article