What are the key differences between endpoint detection, extended detection and managed detection response solutions, and how can IT leaders make the best possible selection based on their organization’s needs? David Chou provides a “quick guide” on what CIOs, CTOs and CISOs need to know.
Running the day-to-day technology services is just one part of being a CIO, said Reid Stephan during a recent interview. “It’s being a trusted thought leader and a trusted executive partner to help drive the overall effectiveness of business operations.”
With phishing attacks becoming increasingly sophisticated, the smart approach is to focus not on prevention, but on identifying the most likely targets, putting controls in place, and offering continuous education, according to our cybersecurity experts.
For IT security leaders, managing the ever-increasing risks associated with connected devices starts with “building a cybersecurity foundation,” said CISOs Todd Greene and Kristopher Kusche during a recent panel discussion.
The easiest route for cybercriminals in accessing patient data is through email, according to CISOs Chris Frenz and Steve Dunkle, who share tips on how to do that, and how to stay ahead of the next wave of threats.