Todd Boehler, ProcessUnity: Risk management, digital transformation and the role of the CISO 

Could you tell us a little bit about ProcessUnity and what it does? 

We're a cloud provider of risk management program automation. 

We help organisations make risk management activities more effective and efficient in their businesses. We have a core concentration around third-party risk and cybersecurity program management, but we also help customers across the entire GRC (governance, risk management, and compliance) landscape. We...

Ransomware mitigation sees focus from AWS, Azure, Google Cloud

Ransomware mitigation strategies have become an increasingly important aspect of major cloud providers’ offering following the pandemic.

In recent weeks, Amazon Web Services (AWS), Microsoft Azure and Google Cloud have all published articles recommending mitigation tactics and best practice in the event of a ransomware attack.

A ransomware attack occurs when company files are encrypted and money is demanded in exchange for the decryption key and the maintained privacy...

Greg Day, Palo Alto Networks: On protecting our way of life in the digital age

Security threats have evolved considerably over the years and Palo Alto Networks knows more than most that “protecting our way of life” also requires a digital approach in the modern world.

Historically, nations would protect their way of life by having the sharpest swords, the biggest guns, the sturdiest tanks, or the fastest planes. Nowadays, it’s as much – if not more – about who has the most secure networks and systems.

CloudTech spoke with Greg Day, VP...

AWS acquires messaging encryption startup Wickr

A graphic of a padlock surrounded by app symbols.

Amazon Web Services (AWS) has snapped up Wickr, which develops secure, end-to-end encrypted communication technology. 

With Wickr, customers and partners can benefit from advanced security features not available with traditional communications services – across messaging, voice and video calling, file sharing, and collaboration. This gives security conscious enterprises and government agencies the ability to implement important governance and security controls to help them meet...

Cloud-native architectures break traditional approaches to app security

An architect's plan..

The rising adoption of cloud-native architectures, DevOps and agile methodologies has broken traditional approaches to application security.

This is according to an independent global survey of 700 CISOs commissioned by Software intelligence firm Dynatrace.

As organisations shift more responsibility 'left' to developers to accelerate innovation, increasingly complex IT ecosystems and outdated security tooling can slow releases by leaving blind spots and forcing teams to...

Five key mistakes which threaten infrastructure cybersecurity and resilience

Bottom line: With many IT budgets under scrutiny, cybersecurity teams are expected to do more with less, prioritising spending that delivers the greatest ROI while avoiding the top five mistakes that threaten their infrastructures.

In a rush to reduce budgets and spending, cybersecurity teams and the CISOs that lead them need to avoid the mistakes that can thwart cybersecurity strategies and impede infrastructure performance. Cutting budgets too deep and too fast can turn into an...