Remove CISO Remove eBook Remove Internet
article thumbnail

Passkeys and The Beginning of Stronger Authentication

Thales Cloud Protection & Licensing

Passkeys and The Beginning of Stronger Authentication madhav Fri, 02/02/2024 - 05:23 How passkeys are rewriting the current threat landscape Lillian, an experienced CISO, surveyed the threat landscape. CISOs, like Lillian , can now redirect their focus to other critical aspects of cybersecurity. Start with our eBook.

article thumbnail

Security resilience: 4 ways to achieve company-wide buy-in

Cisco Security

Also, “Accidental CISO” (AC), Chief Information Security Officer , who was just trying to get SOC2 and ISAC certifications for a vendor when he was abruptly named CISO of his organization. And finally, Christos Syngelakis, CISO, and Data Privacy Officer at Motor Oil Group. That’s a pretty big call.

CISO 94
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NetSPI [Un]Wrapped: Our Top Hits from 2023 

NetSpi Executives

This eBook shares how major companies are using distributed ledger technology (DLT) today and the importance of security planning for blockchain operations. In this article, we explain how the shift to proactive security is rooted in always-on monitoring of known and unknown internet-facing assets.

article thumbnail

Passkeys and The Beginning of Stronger Authentication

Security Boulevard

Passkeys and The Beginning of Stronger Authentication madhav Fri, 02/02/2024 - 05:23 How passkeys are rewriting the current threat landscape Lillian, an experienced CISO, surveyed the threat landscape. CISOs, like Lillian , can now redirect their focus to other critical aspects of cybersecurity. Start with our eBook.

article thumbnail

How to prepare for the California Consumer Privacy Act

Thales Cloud Protection & Licensing

This creates a complex web of rules and regulations that a CISO needs to navigate to protect their company. Where is a CISO to begin? 2) Identify the regulations that will need to be met, a good starting point is reviewing the Thales Data Security Compliance and Regulations eBook. (3)

article thumbnail

To Achieve Zero Trust Security, Trust The Human Element

Thales Cloud Protection & Licensing

For example, how much data, how sensitive, how available must it be, user access levels, what kind of internet connection, access to and from where? Over the last few years, cybersecurity innovators have been introducing various platforms that support this, and CISOs are starting to aggressively plan for and adopt them. Encryption.

article thumbnail

Five Lessons from the JBS Attack for Securing the Manufacturing Supply Chain

Security Boulevard

And what steps should CISOs in the manufacturing industry be taking to secure their rapidly evolving supply chain? Mitigating the risks associated with the rapidly changing manufacturing supply chain must be prioritized by CISOs and form part of a comprehensive “ identity-first security ” strategy. And the list goes on. .