Seasoned cybersecurity leader Vats Srivatsan named Interim CEO and joins WatchGuard's Board; Prakash Panjwani to remain on the Board and serve as strategic advisor.
RSA Conference 2025 in San Francisco was a breath of fresh air, literally and figuratively. The city felt more vibrant and welcoming, and the conference buzzed with genuine excitement. Unlike previous years, which were dominated by hype and theoretical discussions, this year’s focus was on tangible (not yet game-changing!) AI applications in cybersecurity. AI extended throughout the conference, from the keynotes through the track sessions and into the exhibition hall.
In today’s threat-heavy digital environment, having a Business Continuity Plan (BCP) isn’t just smart, it’s essential. Whether it’s a cyberattack, data breach, ransomware, or natural disaster, organizations need a strategy to mitigate risks, reduce downtime, and ensure continued operations. This guide walks you through how to develop a cyber-ready BCP that protects your organization from disruption and prepares you for the unexpected.
Subdomain takeovers are a growing threat in today’s cloud-first ecosystem. As organizations rely on third-party services, continuously launch digital assets, and manage sprawling DNS configurations, they often leave behind vulnerable subdomains ripe for exploitation. In this article, we explore subdomain takeovers, why they pose such a serious risk, and most importantly, how to prevent them before threat actors strike.
A supply chain attack does not start with your firewall. It starts with someone else’s. Instead of targeting your company directly, a cyber attacker looks for weak spots in your organization’s supply chain. That could be a trusted third-party vendor, a widely used software supplier, or even an outdated package from an open-source code repository. Once they find an opening, they exploit security vulnerabilities to gain access to your systems without ever going through the front door.
For financial institutions in New York, the NYDFS Cybersecurity Regulation (23 NYCRR 500) is a vital mandate that requires a strong and comprehensive cybersecurity framework. This regulation outlines numerous requirements aimed at safeguarding customer data and maintaining the integrity of financial systems.
Top tips is a weekly column where we highlight what’s trending in the tech world and list ways to explore these trends. This week, we’ll explore how to prevent our data from being used by AI. The internet remembers everything. The album you posted on Facebook seven years ago, the silly blog you published when you were in school, the memes you liked, the videos you viewed—everything is etched onto the internet. You may forget, but the internet remembers.
In the race to deliver software faster and more frequently, Continuous Integration and Continuous Deployment (CI/CD) pipelines have become the backbone of modern DevOps workflows. But with this speed comes a critical trade-off — security. Integrating security checks into your CI/CD pipeline is no longer optional; it’s a necessity. This is where CI/CD security scanning steps in.
The future of business technology leadership is being reshaped daily; by AI, cloud-native operations, decentralized decision-making, and rapidly shifting business demands. In this evolving landscape, titles matter less than mindset. Whether you’re a CIO, a VP of engineering, a security leader, or a digital transformation manager, the way you lead through technology is changing. What defines today’s most effective business technology leaders?
A constantly shifting threat landscape has given rise to a new cyberattack vector, driven by two powerful forces: the rapid migration of data to the cloud and the fundamental change in how employees access and interact with that data. Today’s workforce expects the freedom to work and access information from any device—especially mobile devices, which have become integral to their professional and personal lives.