Remove blogs expert-perspectives after-breach
article thumbnail

Witnessing a Revolution in Cybersecurity with AI

Palo Alto Networks

{{interview_audio_title}} 00:00 00:00 Volume Slider 10s 10s 10s 10s Seek Slider “AI’s Impact in Cybersecurity” is a blog series based on interviews with a variety of experts at Palo Alto Networks and Unit 42, with roles in AI research, product management, consulting, engineering and more.

article thumbnail

Identity is Security: Fun Idea or Creepy, You Decide

Sailpoint

Growing old after taking a few pictures went viral this week, with celebrities like Drake to the Jonas Brothers turning to FaceApp to show their followers their aged visages. This cybersecurity story initially caught my eye this week largely because of the visual component—it shows, with circles, some of the world’s biggest data breaches.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The True Cost of Cybersecurity Incidents: The Solution

Palo Alto Networks

This is the second blog in a two-part series, breaking down the cost of dealing with an incident versus the cost of investing in cybersecurity to prevent an incident. Make sure to include a “Lessons Learned” hot wash after any testing exercises to identify what Incident Response methods worked well, and what could use some work.

Backup 55
article thumbnail

5 Essential Technologies to get your Distributed Enterprise Future Ready

Trigent

Whether and how much work will return to the workplace (versus work from home) is a matter for a different blog. From an IT/networking perspective, distributed enterprises always moved away from a centralized IT infrastructure to connected islands to maximize convenience, networking and efficiency, faster access, and localized control.

article thumbnail

CXO Cybersecurity Imperatives 2022: A Threat-Intel Informed Approach

Palo Alto Networks

From a cybersecurity perspective, this year was a doozy. We had to deal with one cyber incident after another, across an expanding digital attack surface that, thanks to accelerated cloud migrations, IoT adoption and desktop digitalization, grew at a pace that served only to exacerbate the complexity of responding. Get in Touch.

article thumbnail

‘Hackers’ and ‘cybercriminals’ are not the same thing, here’s why

Lacework

This is why, when expert hacker, author, and speaker Ted Harrington wanted to avoid a line at a bar, he knew exactly what to do. The unique perspective of a hacker. They’re experts at finding alternative ways to accomplish something. A few years later, he read a blog post about people being paid for bug bounties.

article thumbnail

Revisiting Security Fundamentals

CableLabs

The engineers who address cybersecurity must not only be security experts; they must also be experts in the technologies they secure. I’ll discuss integrity and availability in two subsequent blogs. This type of flaw can be discovered decades after the original math was developed. Cybersecurity is a complex topic.