Application securityThe enterprise browser: The first win-win-win for CISOs, CIOs and end usersSC StaffMay 16, 2024Island's Mikey Fey on how enterprise browsers combine security and productivity.
AI/MLOne big problem SOC teams can actually solve with AISC StaffMay 16, 2024Intezer's Jim McDonough on what AI brings to the security table for SOC teams.
Threat ManagementUnpacking XDR: Coverage, stitching, accregation — and the GenAI wildcardSC StaffMay 16, 2024Vectra AI's Oliver Tavakoli on how GenAI affects XDR platforms.
IdentitySailPoint’s approach to unified identity security for the modern enterpriseSC StaffMay 16, 2024SailPoint's Wendy Wu says identity is at the forefront of securing the enterprise.
AI/MLThe role of AI in securing software and data supply chainsSC StaffMay 16, 2024GitLab's Josh Lemos on the role of AI in securing software and data supply chains.
AI/MLSecurity through dataSC StaffMay 16, 2024Cisco's Jeetu Patel discusses Cisco Hypershield to embed security through the fabric of data centers.
Threat ManagementNew research from LevelBlue reveals 2024 cyber resilience trendsSC StaffMay 16, 2024Theresa Lanowitz, LevelBlue's chief evangelist, discusses the threat intelligence team's research from the new alliance between AT&T and WillJam Ventures.
Threat ManagementIntroducing Nightwing — new intelligence services company, 40 years in the makingSC StaffMay 16, 2024Raytheon's cybersecurity intelligence business for government, state and local, and commercial entities was spun out April 1 to become Nightwing.
RSACUnderstanding — and securing against — next generation threatsSC StaffMay 15, 2024OpenText's Paul Reid discusses how security teams must secure as many domains as possible.