Jane Devry's profile photo

Jane Devry

United States

Articles

  • 1 day ago | cybersecurity-insiders.com | Jane Devry

    The world has become increasingly connected, and most business today is done on endpoints, which inherently puts critical assets, customer data, and infrastructure right at the edge – the most vulnerable place to be. The supply chain is also growing more interconnected. A single outage can lead to an entire industry-wide crisis.

  • 1 day ago | cybersecurity-insiders.com | Jane Devry

    The way organizations manage and secure data is changing fast — and for good reason. With sensitive data spread across on-prem data stores, cloud apps and collaboration tools, traditional access control models are no longer enough. Data is spread out in more places than ever, and 35% of breaches in 2024 involved data stored in unmanaged data sources—aka “shadow data.” That’s where data security posture management (DSPM) comes in to help.

  • 1 day ago | cybersecurity-insiders.com | Jane Devry

    As a chief technology officer, you’re responsible for developing and sustaining an environment where a culture of innovation thrives. A CTO’s mission goes beyond managing IT systems and ensuring operational efficiency. Creativity, experimentation and continuous improvement — even the opportunity for someone to get something wrong — are essential for staying ahead of the curve, especially against the evolving tactics of today’s threat actors.

  • 2 days ago | cybersecurity-insiders.com | Jane Devry

    The philosopher Gilbert Ryle coined the phrase “ghost in the machine” back in 1949 to critique the idea that mind and body were separate, coexisting forces. In cybersecurity today, that same philosophy feels uncannily apt – not to describe the metaphysical, but the operational. Our networks are now haunted by an invisible workforce: non-human identities (NHIs) that log on, carry out tasks, make decisions, and interact with critical systems without ever being seen.

  • 2 days ago | cybersecurity-insiders.com | Jane Devry

    Let’s face it — it’s impossible to control every device that exists on a network. This is especially true as companies are leveraging more IoT devices than ever. While IoT devices provide great business value with streamlined data sharing and automated processes, a third-party typically handles maintenance and monitoring, as company IT resources don’t have the specific expertise needed.

Contact details

Socials & Sites

Try JournoFinder For Free

Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.

Start Your 7-Day Free Trial →