article thumbnail

Why Data Ethics Is a Growing CISO Priority

Dark Reading

With data collection growing, and increased concern about how it is handled, a synergy between security and data teams will be essential.

CISO 143
article thumbnail

The Surveillance Invasion: IoT and Smart Devices Stealing Corporate Secrets

Security Boulevard

Chris Clements, VP of Solutions Architecture at CISO Global “Hey Alexa, are you stealing my company’s data?” In an age where manufacturers have decided that just about every device needs to be “smart,” it’s becoming difficult to avoid the data collection and privacy invasion that are often baked into these devices.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SOC Technology Failures?—?Do They Matter?

Anton on Security

A new CISO comes in, tries to champion the implementation of a new tool, the CISO is gone after a short amount of time?—?like like most CISOs, and then a new CISO comes in and tries it all over again. Data collection failures still plague many SOCs. Buy what you would use, and use what brings value!

article thumbnail

GUEST ESSAY: Cisco-Splunk merger will boost Snowflake – here’s how security teams can benefit.

The Last Watchdog

Influxes of data ingestion and the flat architecture of data lakes have led to difficulties in extracting value from repositories. Each data lake can be connected to the threat detection platform which can analyze and detect threats using a unified set of detection logic and advanced AI, with real-time normalization.

article thumbnail

GUEST ESSAY: How SIEMS, UEBAs fall short in today’s turbulent threat landscape

The Last Watchdog

This has left many CISOs questioning if today’s incumbent cybersecurity solutions are enough. This has left many CISOs to questions whether or not today’s cybersecurity categories are still relevant. CISO need to change the conversation. Categorizing solutions. They are not on the front lines fighting the cybersecurity battle.

CISO 140
article thumbnail

Why Application Security is Important to Vulnerability Management

Veracode Security

We were notified of a zero-day vulnerability, and our CISO requested a report on the location of the risk within the enterprise. When they announced a major struts vulnerability targeting SWIFT, my CISO wanted to know exactly where we could find it in our applications. Does this sound familiar? This happened to me.

CISO 98
article thumbnail

How boards can manage digital governance in the age of AI

BH Consulting

Make digital risk a board-level responsibility Directors should integrate AI governance, cybersecurity, and data protection into corporate strategy. Take a risk-based approach Identify, assess, and mitigate risks related to cybersecurity, AI ethics, and personal data protection.