article thumbnail

Cybersecurity Mesh Architecture checklist for CISOs

Security Boulevard

The post Cybersecurity Mesh Architecture checklist for CISOs appeared first on Security Boulevard. CSMA improves a company's security posture without adding specialized products that operate in silos. Unify your products so they work as a security ecosystem.

article thumbnail

CISOs Say Application Security is Broken

Security Boulevard

Nearly three-quarters of CISOs aren’t confident that code in cloud-native architectures is free of vulnerabilities before it goes into production, according to research from Dynatrace. The post CISOs Say Application Security is Broken appeared first on Security Boulevard.

CISO 134
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Forrester: CISO Budgets Not Immune to Cuts

Security Boulevard

Still, a new report from Forrester Research warned that CISOs mustn’t. The post Forrester: CISO Budgets Not Immune to Cuts appeared first on Security Boulevard.

CISO 105
article thumbnail

On the Cybersecurity Jobs Shortage

Schneier on Security

The numbers never made sense to me, and Ben Rothke has dug in and explained the reality : …there is not a shortage of security generalists, middle managers, and people who claim to be competent CISOs. Nor is there a shortage of thought leaders, advisors, or self-proclaimed cyber subject matter experts.

article thumbnail

MY TAKE: As network perimeters shift and ecosystems blend, the role of MSSPs solidifies

The Last Watchdog

I had the chance to discuss this with Shinichi Yokohama, NTT Global CISO and John Petrie, Counselor to the NTT Global CISO, at RSA Conference 2023. Towards zero-trust So how should CISOs steer their organizations? the architecture must come first, and then they can decide which product choices they would prefer.”

CISO 244
article thumbnail

GUEST ESSAY: Cisco-Splunk merger will boost Snowflake – here’s how security teams can benefit.

The Last Watchdog

Splunk’s inability to migrate to a modern cloud-native architecture makes it difficult to take advantage of these cost-saving benefits or implement advanced data science use cases critical for threat detection. Influxes of data ingestion and the flat architecture of data lakes have led to difficulties in extracting value from repositories.

article thumbnail

5 ways to tell you are not CISO material

CSO Magazine

As the role of the CISO continues to grow in importance and gain more responsibility, many cybersecurity practitioners may wonder if they have what it takes to be successful in the role. Technical expertise and experience are obviously huge assets. They know how to make quick decisions and drive change in the organization.

CISO 100