Market Moves: Cybersecurity - Apr 3rd, 2024
 
 
Market Moves: Cybersecurity | View online
 
April 3, 2024
Leading Off

Edging Computing Requires Fresh Strategies

Edge computing is a strategy for computing on the location where data is generated or consumed, allowing data to be gathered and processed at the edge and in near-real-time. This reduces latency and allows rapid decision-making by either machines or humans consuming the data. As the role of today’s CFOs expands, they must act as strategic advisors to the CEO and other business units creating an agile and resilient environment to ensure continued business success, especially in a post-digital transformation environment. Theresa Lanowitz, the Head of Evangelism at AT&T Cybersecurity, provides a compelling article on why successful finance sector edge computing requires a holistic approach encompassing collaboration, compliance, resilience, and adaptability.

If you were wondering about the evolving NIST Cybersecurity Framework 2.0 implications to your organization, read the piece from Chris Kubic, chief information security officer (CISO) at Euna Solution, who delves into the key enhancements of CSF 2.0 and explores its implications for organizations across the spectrum, with a particular focus on the public sector and state and local governments.

And finally, Yaron Fishkin is co-founder and CTO of Silverfort, revisits the recent Midnight Blizzard attacks on Microsoft and why phishing attacks against major organizations will continue to prevail, as threat actors to get more sophisticated and inconspicuous in the artificial intelligence (AI) era.

Read these feature stories and more.

Steve Lasky, Editorial Director for the EBM Security Media Group

 

What CFOs should know about integrating agility and resilience into overall business operations
This article delves into the key enhancements of CSF 2.0 and explores its implications for organizations across the spectrum, with a particular focus on the public sector and state and local governments.
Evolving cybersecurity threats require resources to reduce an organization’s attack surface and their identity attack surface
A well-designed cybersecurity mesh architecture (CSMA) is composable, standardized, linked, and extensible via APIs.
Sponsored

Make better business decisions with the power of market intelligence and data to inform. Elevate your strategies and gain a competitive advantage with insights on key trends and market factors.

Pepper has been incorporated directly into the Salt dashboard, allowing users to find resources and launch in-product walk-throughs easily.
Digitizing documents, automating payments, and storing information has opened the industry to cyberattacks from hackers and other forms of cybercrime.
Trustwave TIaaS includes a comprehensive suite of features designed to provide a holistic view of the threat landscape.
Developed with IBM, the solution serves enterprises that are running on, or moving to, an IBM Power Virtual Server.
Radware Bot Manager proactively and surgically mitigates a new generation of aggressive AI-driven, human-like bots without blocking legitimate users.
This latest addition introduces a suite of advanced features to fortify SAP environments and address global enterprises' evolving security needs.
RSAC 2024 will take place in San Francisco
Sponsored
Join industry leaders to discover practical strategies for enhancing security posture, achieving cost-effective scalability, and aligning cloud security initiatives with business objectives and fiscal responsibility.