article thumbnail

Why CISA is Warning CISOs About a Breach at Sisense

Krebs on Security

The incident raises questions about whether Sisense was doing enough to protect sensitive data entrusted to it by customers, such as whether the massive volume of stolen customer data was ever encrypted while at rest in these Amazon cloud servers. “If they are telling people to rest credentials, that means it was not encrypted.

CISO 310
article thumbnail

From Defense to Offense: Inside-Out Data Security Strategies for CISOs in 2025

Security Boulevard

The post From Defense to Offense: Inside-Out Data Security Strategies for CISOs in 2025 appeared first on Security Boulevard. Challenging the status quo and advocates for inside-out security, placing data at the heart of the strategy from the very beginning, rather than securing it last.

CISO 100
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The CISO: Guardian of Data while Navigating Risk Strategic Insights for the Boardroom and Shaping Future Business

Thales Cloud Protection & Licensing

The CISO: Guardian of Data while Navigating Risk Strategic Insights for the Boardroom and Shaping Future Business madhav Thu, 12/05/2024 - 06:03 CISOs have one of the most vital roles in organizations today. As a CISO, you must elevate your organization’s data security posture. Examples of both are on page 6 of the CISO Guide.

CISO 62
article thumbnail

Spike in encrypted malware poses dual challenge for CISOs

CSO Magazine

Without proper inspection, encrypted data can be a significant security threat as the volume of malware in encrypted traffic grows. That’s the takeaway from two sets of new research into the threat malware hidden in encrypted traffic poses to organizations. To read this article in full, please click here (Insider Story)

article thumbnail

World Backup Day: A Clarion Call for Cyber Resilience

SecureWorld News

Heath Renfrow, Co-Founder and CISO of Fenix14, urges organizations to go further with a more robust strategy: "We advocate for our 5-4-3-2-1 backup methodology. Backup hygiene: encryption, automation, and testing A backup that can't be restored is no backup at all. But in today's threat landscape, that's just the beginning.

Backups 89
article thumbnail

Quantum Resistant Encryption – Are You Ready?

Thales Cloud Protection & Licensing

Quantum Resistant Encryption – Are You Ready? When functional quantum computing becomes available it is anticipated to make many current asymmetric encryption ciphers (RSA, Diffie-Hellman, ECC etc.) Learn more about Thales solutions for quantum resistant encryption. Encryption. Tue, 11/02/2021 - 09:10. .

article thumbnail

Today’s CISO Insights – How to Tackle the Quantum Threat

CyberSecurity Insiders

Due to this specific way of processing, quantum computers can also break many of the current encryption algorithms used to protect data. This is why CISOs everywhere should be concerned. Most likely his data is protected using current encryption algorithms and keys. It is safe, encrypted, and should take forever to decrypt.”

CISO 133