This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
A Uber breach verdict was handed down that could prove highly impactful to CISOs and CSOs in the near and distant future. The post “How will the Uber Breach Verdict Affect the CISO Role in the Future?” appeared first on Radware Blog. The post “How will the Uber Breach Verdict Affect the CISO Role in the Future?”
I’ve been blogging about what should be the “big 3” topics at this week's (virtual) RSA conference. I started with a blog about XDR followed by another about Zero Trust. My final blog of this series looks at what CISOs want to hear about SASE at RSA. To read this article in full, please click here (Insider Story)
Don’t be surprised by what can be accomplished when a CSO & CISO join forces to fight Insider threats Whether you are fighting anonymous digital adversaries or those that operate in the flesh, it’s fair to say that in our security landscape, insider threats rank high on the list of public enemies.
LinkedIn said in a recent blog post that it anticipates shuttering LinkedIn in China by year’s end. LinkedIn recently announced it is closing its flagship social network in China citing a “challenging operating environment and greater compliance requirements.” To read this article in full, please click here
In my last blog, I described 8 things security executives want to hear about XDR. Usually there’s one topic at RSA that everyone is talking about, but this year there will likely be 3: secure access service edge ( SASE ), eXtended Detection and Response (XDR), and zero trust. This one focuses on zero trust (ZT).
Nuspire recently announced findings from its annual research study revealing CISO challenges, priorities and key trends, as well as the drivers behind their purchasing decisions. Cunningham, CSO, hosted a webinar to review the data in detail and explain its implications. Read on to get the highlights. Read on to get the highlights.
Michael Gregg, the CISO for the State of North Dakota, speaks across the country, including keynoting at SecureWorld Detroit on Sep. A recent blog by Frank Domizio titled " The CISO Role: Beyond Technology " explores exactly what I am talking about. That's a soft skill that even the most adept CISOs are still trying to master.
In this session led by Cisco Secure CISO Josh Yavor, you’ll learn about best practices that Cisco implemented to enable secure access for a global remote workforce, providing the best experience for productivity without compromising on security.
In my last blog post , I described how the market for eXtended Detection and Response (XDR) is evolving and how CISOs should approach this new and promising technology. To read this article in full, please click here (Insider Story)
As of today I’m transitioning out of my CISO role at DataGravity and am on the hunt for a new full-time gig. For some background on my past work experience, please check LinkedIn ( [link] ) or the press kit section of my blog ( [link] ). CTO, CISO, CSO, etc.) CISO, CSO, etc.) A senior leadership (e.g.
For more information about data and AI security posture management ( DSPM and AI-SPM ), check out these Tenable resources: Data and AI Security Posture Management (video) Harden Your Cloud Security Posture by Protecting Your Cloud Data and AI Resources (blog) Know Your Exposure: Is Your Cloud Data Secure in the Age of AI? (on-demand
Shannon Lawson, CISO for the City of Phoenix, and Geoffrey Coulehan, Head of Sales for MixMode recently joined forces for a fireside chat at the Evanta CISO Summit in Phoenix, AZ. The post Video: Modernizing Phoenix’s Cybersecurity to Combat Nation-State Attacks appeared first on Security Boulevard.
In a recent blog, McAfee’s Steve Grobman indicated SolarWinds is the first major supply chain attack which represents a shift in tactics where a nation state has employed a new weapon for cyber-espionage.” A CISO or CSO should be able to look at a single screen and understand in minutes how well protected they are against potential threats.
Plus, a PwC study says increased collaboration between CISOs and fellow CxOs boosts cyber resilience. Less than 50% of respondents say their organizations’ CISOs are involved “to a large extent” with strategic planning, reporting to the board and overseeing tech deployments.
Cyberattackers and cyberdefenders appear to be utilizing AI (artificial intelligence) and ML (machine learning) to a rapidly increasing degree, if you are to believe the press, vendors’ claims and blogs. A recent article, […]. The post Cybersecurity and AI/ML Biases appeared first on Security Boulevard.
Originally published on CSO. While scientists may rejoice at the idea of large-scale quantum computing, CISOs are right to feel nervous. While scientists may rejoice at this idea, CISOs are right to feel nervous. Computer networks are only secure because today’s computers can’t solve certain mathematical problems.
Chris was the former head of DHS’s CISA (Cybersecurity & Infrastructure Security Agency), and Brian is a journalist and much-admired author (by me and many others) of the outstanding blog KrebsonSecurity. I described Chris Krebs’s position on addressing ransomware […]. The post Krebs on Ransomware appeared first on Security Boulevard.
Under the guidance of Dan Meacham, VP of Global Security and Corporate Operations and CSO/CISO, the multi-billion dollar organization transitioned from on-premises data centers to the cloud in 2012. The post Legendary Entertainment Relies on MVISION CNAPP Across Its Multicloud Environment appeared first on McAfee Blogs.
Unraveling the True Security Risks ” (SecurityWeek) “ How deepfakes threaten biometric security controls ” (TechTarget) “ Deepfakes break through as business threat ” (CSO) 3 - Fake update variants dominate list of top malware in Q3 Hackers are doubling down on fake software-update attacks.
Since hiring its current CISO Jamil Farshchi , however, the firm has placed a stronger emphasis on fortifying its own internal security hygiene. According to the blog post, a whistleblower with insider information “massively downplayed a catastrophic incident to minimize the hit to its stock price.”
It is not only the CISO, CSO or CIO’s responsibility to care and do the right thing. appeared first on McAfee Blogs. Everyone is responsible and accountable. Everyone on the board is responsible and could potentially be held accountable for a breach both legally and financially.
And get the latest on MFA methods, CISO trends and Uncle Sam’s AI strategy. 6 - State CISOs on the frontlines of AI security As the cybersecurity risks and benefits of AI multiply, most U.S. state CISOs find themselves at the center of their governments' efforts to craft AI security strategies and policies. national security.
In this blog, I’m exploring these changes, grouped under key categories that I’ve used in previous years, to help business leaders and cyber risk owners better prepare for the evolving landscape. Useful resources include: The Professional Association of CISOs at [link].
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content