Search:
Latest Posts
Adenike Cosgrove, Proofpoint International’s Senior Director of Product Marketing, argues that the risk of numerous cyber threats can be significantly reduced by improving email security – the number one ransomware threat vector Global cybersecurity spending is projected to reach US $302 bn by ...
How will Ransomware Evolve in 2022?
At CISO London 2021, our panel of industry experts discussed how CISOs should approach the threat of ransomware in the ...
Time for a Mesh Start? How Vistaprint Reimagined Its Data Architecture as a Data Mesh
Sebastian Klapdor, EVP and Chief Data Officer at Vistaprint, explained how Vistaprint scaled the benefits of its data ...
Zero Trust: Cutting Through the Spin
CISOs are increasingly implementing zero-trust initiatives as they modernize their security architecture – but how much ...
Secure Digital Transformation and Data Democratization Top Agenda at CISO London
As CISO and Head of Data Governance for insurance company esure, Stephen Owen had a golden opportunity to empower his ...
Quantum Computing is Poised to Revolutionize Cryptography
In this week’s episode of the Business of InfoSec Podcast, we chat to Voya Financial CISO and author Raj Badhwar about ...
Will APIs be the Greatest Cyber Threat to Your Business in 2022?
Digital transformation and the shift to hybrid working triggered a rapid rise in the use of APIs. Now, the associated ...
Victoria van Roosmalen: Inspiring Women to Defy Expectations
Ahead of appearing at CISO Europe, Victoria van Roosmalen shares her experience of success in a traditionally ...
Karen Holmes: Cybersecurity Teams Must ‘Automate or Die’
In this episode of the Business of InfoSec Podcast TrueBlue CISO and SVP Karen Holmes explains why she is putting ...
Exploring the Reality of Ransomware Attacks in 2021
In this discussion from CISO Champions Live, US, our panel of experts discusses how to mitigate the risks associated ...
Building an Organization-Wide Culture of Data Security
To mark cybersecurity awareness month we asked leading CISOs about how they are communicating cybersecurity risk to ...
Taking Data Strategy from Theory to Practice
Rogayeh Tabrizi, CEO and co-founder of data science firm Theory + Practice shares her advice on creating a data ...
My Neighbor Hacked My Toothbrush: The Cybersecurity Implications of IoT
University of Edinburgh Deputy CISO Garry Scobie joins us on the Business of InfoSec Podcast to discuss the ...
Fighting Back Against Ransomware as a Service: Jules Pagna Disso
Ransomware has become a successful service-based business model, what follows is diversification, innovation, and ...
Our Upcoming Events
Articles
Built-In, Not Bolted On: Rethinking Security as a Platform
Corinium’s Maddie Abe engaged with Rahul Trikha, Director of Technology Platforms & Developer Experience at Domain, to discuss the intersection of platform engineering and cyber security. In my earlier article on platform engineering, I explored whether platform engineering is replacing DevOps, ...
New Data Shows Why AI Governance Must Start Before You Build Anything
By the time your generative AI model is ready for production, it might already be too late to govern it properly A large wave of new enterprise AI projects is on its way. More than 80% of organizations in North America have at least 51 use cases in the pipeline, a survey published this week by ...
Building a Human Firewall from the C-Suite Down: Cyber-Awareness as a Strategic Priority
Phishing, ransomware, and other human-centric attacks continue to exploit gaps in judgement rather than gaps in code. This reality presents both a challenge and an opportunity: to reframe cyber awareness as a strategic leadership priority, not just a checkbox. Cyber security is a strategic concern ...
Building Adaptive and Future-Ready Enterprise Security Architecture: A Conversation with Yusfarizal Yusoff
Corinium’s Content Director, Eleen Meleng, spoke with Yusfarizal Yusoff, an experienced cybersecurity practitioner on the challenges to build a sound and scalable security architecture and the need for change in the industry. Enterprise Security Architecture (ESA) is fundamentally about designing a ...
Building a Human Firewall from the C-Suite Down: Cyber-Awareness as a Strategic Priority
Phishing, ransomware, and other human-centric attacks continue to exploit gaps in judgement rather than gaps in code. This reality presents both a challenge and an opportunity: to reframe cyber awareness as a strategic leadership priority, not just a checkbox. Cyber security is a strategic concern ...
Reports
CISOs Can't Afford to Ignore Active Directory
Old, avoided and potentially vulnerable, Active Directory and identity stores can be a major risk waiting to materialise. While multiple security layers often exist to protect organisations from outside threats, the fundamental configurations and hygiene of identity management storage systems are ...
Unlocking the Potential of Interoperability in Federal Government
Data is the backbone of modern governance, but fragmented, siloed systems hinder the ability of federal agencies to make informed decisions, respond to crises, and drive innovation. Without interoperability, data is trapped—isolated in departments, stored in incompatible formats, and duplicated ...
The New Era of Gen AI: Enabled by Logical Data Management
Many organizations are still struggling to implement a data foundation that can scale across the increasing number of data sources and increasing volumes of data required by Gen AI; enable all Gen AI applications and other data consumers to access the data they need in real time, and in a safe and ...
AI in Government: Building on Data, Context, and Trust for Success
The AI Readiness Imperative for Federal Agencies In an era where AI adoption is accelerating, federal agencies must balance innovation with responsibility. AI presents transformative opportunities—optimizing workflows, reducing costs, and improving public services—but only if built on a strong ...
The New Era of Gen AI: Enabled by Logical Data Management
Many organizations are still struggling to implement a data foundation that can scale across the increasing number of data sources and increasing volumes of data required by Gen AI; enable all Gen AI applications and other data consumers to access the data they need in real time, and in a safe and ...
Podcasts
Australia’s Award-Winning Jalpa Bhavsar: Leveraging Transferable Skills to Break into Cyber
Jalpa Bhavsar shares insights on how to leverage soft skills and build technical knowledge to pursue a successful career in cybersecurity In this episode of the Business of Infosec podcast, host Michelle Ribeiro is joined by mentor, speaker, podcaster and award-winning Cybersecurity Professional, ...
The Must-Dos for a Highly Capable Cyber Team
Transformation Executive Deepa Bradley and Let’sWeCan Co-Founder Daniel Shore talk about building highly capable cyber teams In this week’s episode of the Business of Infosec podcast, host Michelle Ribeiro is joined by Transformation Executive Deepa Bradley and Let’sWeCan Co-Founder Daniel Shore. ...
Former CISO Rob Wiggan Debunks Cyber Insurance Myths
Rob Wiggan shares insights on career change and how to adopt a winning cyber insurance approach In this week’s episode of the Business of Infosec podcast, host Michelle Ribeiro is joined by Rob Wiggan, a former CISO and accomplished IT professional with more than 25 years of industry experience. ...
Australia’s Award-Winning Jay Hira: Key to Zero Trust Success is Strategy, Not Tools
Jay Hira shares insights on Zero Trust imperative, collaboration, and diversity and inclusion in cybersecurity In this week’s episode of the Business of Infosec podcast, host Michelle Ribeiro is joined by award-winning Cybersecurity Strategist, Jay Hira. Together they walk through Jay’s computer ...
Former CISO Rob Wiggan Debunks Cyber Insurance Myths
Rob Wiggan shares insights on career change and how to adopt a winning cyber insurance approach In this week’s episode of the Business of Infosec podcast, host Michelle Ribeiro is joined by Rob Wiggan, a former CISO and accomplished IT professional with more than 25 years of industry experience. ...
Videos
The Future of AI in Asset Management: A Conversation with Matthew Curnow of Wood
Matthew Curnow the Head of Digital Strategy, Data Management & AI at Wood explores the evolving role of AI in engineering and operations in this interview with Corinium’s Eleen Meleng. Matthew Curnow shares his thoughts on how AI is becoming a core component in various industries, including ...
Agresh Doshi: What insights in advancing data, AI and analytics are changing the public sector?
Corinium’s Vanessa Jalleh had the opportunity to speak to the Bureau of Meteorology’s Digital Development and Solutions Manager, Agresh Doshi. Agresh Doshi, the Bureau of Meteorology’s Digital Development and Solutions Manager, shares his thoughts on advancing data, AI, and analytics in the modern ...
DevOps Done Right: Unlocking DevSecOps Success at Toyota Finance Australia
Toyota Finance Australia’s Vijay Jay shares his team's inspiring journey to integrate security into their DevOps practices. DevOps is a constantly evolving field, and finding the right balance between security, agility, and efficiency can be a real challenge. Vijay Jay, the Practise Manager - ...
ANZ Bank Exec Discusses Key DevOps Challenges for Australians
Elizaveta Konovalova unravels the intersections of DevOps, DevSecOps, and the need for scalability. The demands of a rapidly changing tech and threat landscape has made building sophisticated Continuous Integration and Continuous Delivery pipelines and application security measures absolutely ...
DevOps Done Right: Unlocking DevSecOps Success at Toyota Finance Australia
Toyota Finance Australia’s Vijay Jay shares his team's inspiring journey to integrate security into their DevOps practices. DevOps is a constantly evolving field, and finding the right balance between security, agility, and efficiency can be a real challenge. Vijay Jay, the Practise Manager - ...