Remove 2020 Remove Architecture Remove CISO
article thumbnail

MY TAKE: As network perimeters shift and ecosystems blend, the role of MSSPs solidifies

The Last Watchdog

I had the chance to discuss this with Shinichi Yokohama, NTT Global CISO and John Petrie, Counselor to the NTT Global CISO, at RSA Conference 2023. Towards zero-trust So how should CISOs steer their organizations? the architecture must come first, and then they can decide which product choices they would prefer.”

CISO 244
article thumbnail

Cisco Secure Endpoint Shines in the 2020 MITRE® Engenuity ATT&CK Evaluation

Cisco Security

That’s why MITRE Engenuity focused on hacker groups Carbanak and FIN7 in the 2020 ATT&CK® Evaluation. Cisco Secure Endpoint and MITRE ATT&CK: Why it matters to CISOs right now. Cisco Secure Endpoint is security that works for your secure remote worker, SASE, XDR, and Zero Trust architecture. See it for yourself.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What’s It Like for a New CISO?

Lenny Zeltser

As of this writing, I’ve spent six months in the role of Chief Information Security Officer (CISO) at Axonius , a rapidly growing technology company. Our IT infrastructure is consistent zero-trust architecture principles , so it made sense to treat identity as the focal point of many security decisions.

CISO 84
article thumbnail

My 2020 Predictions Revisited: What Worked, What Didn't

Duo's Security Blog

“Turns out, people aren’t all that good at predictions,” I wrote in my 2020 article. Few could foresee the turns 2020 would take. Cyber Crime in 2020 I predicted, with money still being the top motivating factor for crime, criminals would blend techniques and technologies into new unforeseen attacks. Well, it was.

article thumbnail

A Reactive Cybersecurity Strategy Is No Strategy at All

CyberSecurity Insiders

A foundational approach to cybersecurity empowers CISOs to see abnormalities and block threats before they do damage. In 2020, the SolarWinds supply chain attack opened backdoors into thousands of organizations (including government agencies) that used its services, while late last year, the far-reaching Log4J exploit exploded onto the scene.

DNS 140
article thumbnail

GUEST ESSAY: How SIEMS, UEBAs fall short in today’s turbulent threat landscape

The Last Watchdog

This has left many CISOs questioning if today’s incumbent cybersecurity solutions are enough. This has left many CISOs to questions whether or not today’s cybersecurity categories are still relevant. It requires a massive architecture overhaul. CISO need to change the conversation. Categorizing solutions.

CISO 140
article thumbnail

Is Your Security Stack and Legacy Tech Keeping Pace With Your Business?

CyberSecurity Insiders

By Tyler Farrar, CISO, Exabeam. It makes sense that security budgets should follow to help protect these increasingly diverse and flexible architectures. In most scenarios, CISOs have three choices when considering a move away from legacy tech: 1.Take While organizations faced an unknown road ahead, they were quick to adapt.