Sead Fadilpasic
Latest from Sead Fadilpasic
Effectively addressing security challenges through visibility, trust and actionable data
Maintaining brand reputation is vital for any company, as even a minor breach in an office can greatly affect stock price and how the public perceives the company. For this and other reasons, Hubble Technology Inc., a cybersecurity consulting business, was created to address inconsistent technology environments. The need for visibility in security operations is ...
Balancing AI and partnership: Salesforce’s strategy for securing the cloud
Salesforce Inc. places an emphasis on a shared security model when it comes to cloud security. The company, along with its users, have clearly defined roles and responsibilities. This approach led cybersecurity company CrowdStrike Holdings Inc. to award Salesforce with its “Protector of the Year” award during this week’s Fal.Con event. Salesforce will continue to ...
CrowdStrike innovates with AI to outmaneuver cyber adversaries
Recent events, such as the MGM cyberattack in Las Vegas, have caused a shift in the threat landscape. Meanwhile, CrowdStrike Inc.’s primary goal remains unchanged: to prevent breaches and protect against adversaries, according to Jennifer Johnson (pictured), chief marketing officer of CrowdStrike. The company seeks to continuously adapt and evolve its approach and employ new ...
Prioritizing immediate security concerns: How adaptation and training can help companies with threat detection
In today’s cyber world, many organizations struggle with outdated processes and ineffective approaches to monitoring cloud threats. Security operation teams need to catch up with the fast-paced changes in tools and modernize their thinking and practices to align with the dynamic nature of cloud-native services. This represents a bigger challenge than simply updating the tools ...
Adapting to new rule changes in cyber risk management: How the SEC changed the game
Security and Exchange Commission’s July 2023 rule changes in cyber risk management require companies to disclose governance processes and cyber risk in 10-K filings, define materiality thresholds and publicly disclose material cyber incidents within four days in an 8-K filing. Companies should now establish a framework for determining materiality, considering various factors, as the SEC ...
Responding to advanced data threats and ransomware attacks through collaboration
The threat landscape is bifurcated between fast and destructive ransomware attacks and slow and quiet advanced threat actors, leading organizations to focus on endpoint, identity, cloud and threat network security. These developments have led to Corelight Inc. and Mandiant Inc. establishing a collaboration in which Mandiant leverages the capabilities of Corelight technology for its response ...
Cloudflare transforms zero-trust security with rapid innovation and community engagement
Cloudflare Inc. is seeing trends in zero trust that prioritize quick deployment, efficiency and ease of use with its massive global edge network and pace of innovation being key factors in its success. “Managers, they want something that is able to be deployed very quickly, and they want something that’s able to be deployed very ...
How to safely deploy generative AI in a business environment: A Securiti perspective
The advancements in artificial intelligence technology have brought about a revolution by enabling machines to comprehend language and unstructured data. Consequently, ChatGPT is bringing about a transformation in the cloud sector by leveraging AI. This enables companies to securely harness its enterprise data while offering a perspective on data across divisions within an organization. Securiti ...
Turning compliance into a competitive advantage: How startups and enterprises can innovate securely
In order to establish trust, stand out from the competition and safeguard customer data, both startups and established companies need to give priority to compliance and security measures. This focus on compliance by startups is justified as an aim to transform it into a catalyst for innovation rather than a form of hindrance given the ...
The cloud security gap: Solving data protection vulnerabilities putting companies at risk
The absence of tools specifically designed for identifying and securing cloud-based storage has resulted in vulnerabilities in data protection. Consequently, a significant number of organizations face attacks, with nearly half experiencing such attacks on a regular basis — daily, weekly or monthly, according to a recent report from Cloud Storage Security. Setting up and securing the ...