A business magazine for executives on
cybersecurity management, trends, and best practices.
  • EDITOR'S PICKS
  • TOPICS
    5G SecurityAI and Machine LearningCloud SecurityLeadershipCyber ThreatsGovernance and ComplianceIoT SecurityRisk ManagementSecuring Remote WorkforcesSecurity OperationsTechnology TrendsZero Trust

    Adopting 5G as Your Private Mobile Network? Now, Think Security.

    By Mike Perkowski

    What Can Service Providers Do About 5G Security?

    By Sean Duca

    Security Chiefs: Don’t Ignore the 5G Future, It’s Coming Fast

    By Greg Day

    When Bad Guys Use AI and ML in Cyberattacks, What Do You Do? 

    By Mercedes Cardona

    AI and Machine Learning: Do You Know the Difference?

    By Al Perlman

    What Kind of Artificial Intelligence Do You Need for Security?

    By Greg Day

    The Path to a Successful Cloud Transformation

    By Mike Towers

    Is Moving Operational Technology to the Cloud a Good Idea?

    By Kevin O’Malley

    Can You Talk the Talk? Cloud Jargon 101 for Executives

    By Mike Perkowski

    The Keys to CISO Role Success—Part Two: Elevating Your Stature

    By Ed Harris

    The Keys to CISO Role Success—Part One: Entering a New Role

    By Ed Harris

    How Greater Diversity Can Help Fill the Cyber Talent Gap

    By Krishnan Chellakarai

    What Executives Need to Know About Emotet

    By Unit 42

    Data Manipulation, Law Enforcement and Our Future

    By Dr. Philipp Amann

    Social Engineering and the Art of Fishing

    By Kevin O’Malley

    Is the SHIELD Act on Your Compliance Radar?  

    By Paola Zeni

    As GDPR Fines Spiral, Take Privacy by Design Seriously

    By Fred Streefland

    How to Build Compliance into Cybersecurity 

    By Sam Greengard

    How to Secure IoT in Financial Services?

    By Mercedes Cardona

    The Myths of IoT Security

    By Sam Greengard

    From Doorbells and Fish Tanks to Nuclear Reactors: Why Focus on IoT Security

    By Greg Day

    Strengthening Retail’s Resilience Against Ransomware

    By Ashok Rutthan

    Making Cyber Resiliency a Priority in Healthcare: My Advice for Leaders

    By Derrick Lowe

    How to Optimize Cybersecurity Using Measurement

    By Richard Seiersen

    Forget About the New Normal. We’re in the New Now.

    By Bruce Crawford

    CIOs: 5 Remote Work Trends to Watch Out For

    By Naveen Zutshi

    When Remote Work Is the Norm, You’ve Got to Modernize Your Network

    By Greg Day

    How Can CISOs Tackle the SOC Talent Shortage?

    By Mercedes Cardona

    What I Learned in the FBI About the Need for Security Automation 

    By M.K. Palmore

    The SOC of the Future: Remote, Powerful and a Frankenstein No More

    By Niall Browne

    Private Mobile Networks: Know Your Language 

    By Mike Perkowski

    Why Is SD-WAN So Popular?

    By Sean Duca

    The Future of the Branch Office Starts With Transformation

    By Naveen Zutshi

    The Machines Are Coming: Financial Services Can Reduce the Blast Surface With Zero Trust

    By Tarun Khandelwal

    The SolarWinds Hack: Why We Need Zero Trust More Than Ever

    By George Finney

    The Only Way to Secure the IoT Is Zero Trust

    By Jamison Utter

  • LATEST ARTICLES
A business magazine for executives on
cybersecurity management, trends, and best practices.
  • EDITOR'S PICKS
  • TOPICS
    • – 5G Security
    • – AI and Machine Learning
    • – Cloud Security
    • – Leadership
    • – Cyber Threats
    • – Governance and Compliance
    • – IoT Security
    • – Risk Management
    • – Securing Remote Workforces
    • – Security Operations
    • – Technology Trends
    • – Zero Trust
  • LATEST ARTICLES

AUTHOR

Gary Johnson

Gary Johnson is senior director of security and infrastructure at Evergy, a major investor-owned electric utilities provider.

BY THIS AUTHOR

Cyber Threats

What Executives Need to Know About Emotet

By Unit 42

Risk Management

Strengthening Retail’s Resilience Against Ransomware

By Ashok Rutthan

Leadership

The Keys to CISO Role Success—Part Two: Elevating Your Stature

By Ed Harris

Leadership

The Keys to CISO Role Success—Part One: Entering a New Role

By Ed Harris

Leadership

How Greater Diversity Can Help Fill the Cyber Talent Gap

By Krishnan Chellakarai

What Executives Need to Know About SpringShell (aka Spring4Shell)

By Unit 42

Leadership

We All Need a Stronger Cybersecurity Posture. Here’s How. (Hint: First, It’s a Mindset)

By Gary Johnson

Most Popular

  • Making Cyber Resiliency a Priority in Healthcare: My Advice for Leaders
  • The Machines Are Coming: Financial Services Can Reduce the Blast Surface With Zero Trust
  • We All Need a Stronger Cybersecurity Posture. Here’s How. (Hint: First, It’s a Mindset)
  • An Antidote to Stress in Cybersecurity
  • The Keys to CISO Role Success—Part One: Entering a New Role
  • How to Optimize Cybersecurity Using Measurement
  • What Executives Need to Know About SpringShell (aka Spring4Shell)
  • How Greater Diversity Can Help Fill the Cyber Talent Gap
  • The Keys to CISO Role Success—Part Two: Elevating Your Stature
  • What Executives Need to Know About Emotet

MORE

  • ABOUT SECURITY ROUNDTABLE
  • TERMS
  • PRIVACY
  • CONTACT US

Copyright © 2022 Palo Alto Networks. All rights reserved

Palo Alto Networks Logo

SUBSCRIBE

Be A Part Of Our Executive Community

Join thought leaders from around the world for best practices on pressing risk management topics.

Our mission is to empower business leaders to make smart decisions on cybersecurity and the digital transformation.

SUBSCRIBE

You're Signed Up!

Also check us out on Twitter and LinkedIn.

EDITOR'S PICKS

  • Making Cyber Resiliency a Priority in Healthcare: My Advice for Leaders
  • An Antidote to Stress in Cybersecurity
  • Is Moving Operational Technology to the Cloud a Good Idea?
  • From Doorbells and Fish Tanks to Nuclear Reactors: Why Focus on IoT Security
Please enter a valid email address.