Organizations today must ensure their chief information security officer (CISO) has the leadership and business qualities necessary to drive effective management of cyber risks. In a world where the roles and responsibilities of this position are still evolving, pinning down the traits of effective cybersecurity leaders can prove challenging, yet…
Read More
The last few years have seen a surge of interest in security orchestration and automation (SOA) and how security operations teams can benefit from its adoption. The security orchestration, automation and response (SOAR) market, as defined by Gartner in 2017, evolved from three previously distinct technologies: SOA, security incident response…
Read More
As a lifelong engineer, my career has been dramatically impacted by the open source movement, along with those of my fellow engineers. Growing up in a business environment where closed platforms once dominated, many of us had to recalibrate our thinking as the open source revolution in the 90’s unfolded.…
Read More
Great security depends on the ability to know who is authorized and who is not. This applies to both physical and digital security. But how do you accomplish this? Increasingly, one answer is facial recognition, which is improving rapidly thanks to artificial intelligence (AI) and related technologies. Hundreds of thousands…
Read More