This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
There are several methods of active defense that companies can utilize to safeguard their networks, and it’s time for CISOs to start picking. He previously managed development teams at Check Point Software Technologies and was a research assistant in the Atom Chip Lab focusing on theoretical Quantum Mechanics.
With the addition of Kenna Security into our program we now have over 250 technology partners and over 400 integrations for our mutual customers to utilize. An integration with Cigent Technology is now available for Secure Endpoint customers to integrate with. Kenna has a healthy 3rd Party ecosystem of technology partners.
The incident has raised concerns within the energy sector, as Halliburton plays a crucial role in global oilfield operations, and any disruption to its networks could have far-reaching implications. The potential cyberattack on Halliburton underscores the growing threat to critical infrastructure and companies within the energy sector.
In 2022, we will see 5G go from new technology to a business enabler bringing previously unimaginable use cases because of its high bandwidth and lower latency. Data from the current AT&T Cybersecurity Insights Report shows that 5G technology is being driven by the line of business and has been siloed between IT and OT organizations.
With a career spanning two decades as a technology provider to businesses and government agencies, Levine brings a strategic and pragmatic approach to building secure software and cloud services without disrupting product velocity. Todd Bell serves as the chief information security officer and executive director at Valleywise Health.
I was fortunate enough to have connected with the previous CISO at the org, and he recruited me into the role. A : You never get bored with the ever-changing risks, problems, or new technology to learn about! Ryan will be moderating the Advisory Council Roundtable Lunch on the topic of The Surprising List of CISO Top Concerns.
5G technology will improve some IoT use cases, thereby adding to the proliferation of IoT devices – a phenomena individuals and organizations aren’t prepared to fully defend in the immediate future. Untrusted proprietary technologies that fail to meet these standards pose lingering threats to their clients and inefficiencies.
In this Spotlight Podcast, host Paul Roberts talks with Chris Walcutt, the CSO of DirectDefense about the rising cyber threats facing operational technology (OT) and how organizations that manage OT - including critical infrastructure owners can best manage increased cyber risks to OT environments. Read the whole entry. »
We need to take user protection seriously, change the security paradigm, by studying and building protections around people and processes, rather than solely focusing on technology. In fact, reports suggest that Colonial paid a $5 million ransom—which goes to show how well our technical safeguards and incident response systems has failed.
By Curtis Simpson, CISO. Because back in July 2020, the NSA and CISA warned of the perfect storm facing critical operations reliant upon operational technology (otherwise known as OT). Hackers Tap into Oldsmar Water Facility. That’s what makes this attack so concerning. An individual that happened to be staring at a screen.
Recently, the NSA has recommended that federal agencies hosting secret or top-secret data utilize storage solutions that have been CSfC validated. This unique achievement is an example of innovation in commercial technology addressing critical national security issues,” said Admiral Michael S. Rogers USN (Ret.),
As 2024 comes to a close, I revisit my forecasts to assess their utility in guiding meaningful decisions. Sources : MIT Technology Review , CSIS Analysis. Critical Infrastructure Targets Grade: PASS Critical infrastructure remains a primary target, with sectors like energy and healthcare facing ransomware and disruptive attacks.
They are words that could strike fear into the heart of a CISO, Chief Risk Officer, or corporate counsel. Could your organization have an insider threat attempting to utilize these same methods and technologies? These are expensive and technologically advanced nuclear-powered cruise-missile, fast-attack subs, which the U.S.
Former Medallia VP of Cloud Security and current Chief Information Security Officer (CISO) at Inspectiv , Ray Espinoza , has spent over 15 years working in security information management. Mastering new technologies while growing is even harder, especially on a demanding timeline. Ask the Expert. Threat hunting.
Government actions will increase: Expect more government regulations, state-sponsored cyberattacks, and increased documentation required to protect CISOs. AI Use Danger As with any emerging technology, many organizations should expect errors and growing pains as teams learn the nuances of applying the technology.
In a new Enforcement Alert , the agency is calling on water utilities to immediately enhance their digital defenses to protect public health and safety. Steven Aiello , Field CISO, AHEAD, said lack of funding may be an inhibitor for better securing critical infrastructure like water treatment facilities. "I
Cybersecurity is on the brink of significant transformation as we approach 2025, grappling with escalating complexities driven by advancements in technology, increasing geopolitical tensions, and the rapid adoption of AI and IoT. Ethics The ethical challenges posed by advancing AI technologies will demand urgent attention in 2025.
Thornton-Trump Ian Thornton-Trump , CISO, Inversion6 In 2024, the convergence of nation-state APTs and cybercriminals raised global alarms. Cunningham John Paul Cunningham , CISO, Silverfort Identity-based attacks in 2024, like those on Microsoft and Snowflake, are prompting insurers to intensify scrutiny in 2025.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content