Remove Article Remove CSO Remove Cyber threats
article thumbnail

What is an ISAC or ISAO? How these cyber threat information sharing organizations improve security

CSO Magazine

Editor's note: This article, originally published on July 3, 2019, has been updated with a directory of ISACs and ISAOs.] An Information Sharing and Analysis Center (ISAC) is an industry-specific organization that gathers and shares information on cyber threats to critical infrastructure. ISAC and ISAO definition.

article thumbnail

The 10 most dangerous cyber threat actors

CSO Magazine

To read this article in full, please click here (Insider Story) Today, nation-state actors are developing increasingly sophisticated cyberespionage tools, while cybercriminals are cashing in millions of dollars targeting everything from Fortune 500 companies to hospitals.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The strong link between cyber threat intelligence and digital risk protection

CSO Magazine

While indicators of compromise (IoCs) and attackers’ tactics, techniques, and processes (TTPs) remain central to threat intelligence, cyber threat intelligence (CTI) needs have grown over the past few years, driven by things like digital transformation, cloud computing, SaaS propagation, and remote worker support.

article thumbnail

7 tips for better CISO-CFO relationships

CSO Magazine

Sign up for CSO newsletters. ]. The CFO/treasurer-CISO relationship is critical in understanding how the [organization] measures success, which helps with how best to measure and communicate the cyber threats it faces,” says Arthur Treichel, CISO for the State of Maryland. To read this article in full, please click here

CISO 137
article thumbnail

BrandPost: Scary Cyber Threats and Sweet Solutions

CSO Magazine

What is even scarier: Not having systems in place to protect against malware and other cyber threats. Cyber Threats That Frighten Even The Experts. It's not just malware that poses a threat to an enterprise's systems. Sweet Solutions to Cyber Threats. To read this article in full, please click here

article thumbnail

Cyber threat intelligence programs: Still crazy after all these years

CSO Magazine

When I asked CISOs about their cyber threat intelligence (CTI) programs about five years ago, I got two distinct responses. Large, well-resourced enterprises were investing their threat intelligence programs with the goal of better operationalizing it for tactical, operational, and strategic purposes.

article thumbnail

Why CISOs Are Stepping Away and What the Future Holds

SecureWorld News

Tasked with safeguarding data and infrastructure, CISOs face mounting pressures as cyber threats escalate, regulatory demands grow, and the role expands to encompass strategic business responsibilities. The article appeared originally on Medium here.

CISO 97