This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
I won't spoil the surprise by detailing everything that's yet to come, suffice to say there many other areas of infosec that are equally important to grasp and are uniquely different in their own way. However, if you've been around for a few years, you've seen this "cloud" thing absolutely smashing that idea.
The full list of the Top InfoSec Innovators for 2024: [link] About One Identity: One Identity delivers unified identity security solutions that help customers strengthen their overall cybersecurity posture and protect the people, applications, and data essential to business. Ackerman Jr.
Blockchain: Developed primarily for cryptocurrency applications and maligned for manipulating those markets, blockchain can be a valuable security tool, as its universe of connected nodes is almost impossible to corrupt or destroy. Knowledge of cloud systems architecture and how it interacts with various devices is invaluable.
Cybersecurity professionals have various views on last week's news from the United States Securities and Exchange Commission (SEC) when it surprised the InfoSec community and the C-suites of corporate America. We asked for comments from cybersecurity experts in the SecureWorld network, and here's what they had to say.
As defenders of digital assets, Chief Information Security Officers (CISOs) and cybersecurity professionals face immense pressure, often leading to burnout. Key findings from the report include: 90% of CISOs are concerned about stress, fatigue, or burnout affecting their team's well-being. between May 20, 2024, and May 24, 2024.
Marketing officers may have accepted ad fraud as a cost of doing business, but infosec pros take heed -- fraud can be a step to more significant attacks. Here's what to know and how to take action.
But as a CISO or cyber risk owner, it’s not just about locking down sensitive informationits about doing it without slowing down your people. Amid a backdrop of increasingly sophisticated and frequent cyberattacks, APTs are a growing concern for CISOs and cyber risk owners. But it doesnt stop there.
Welcome back to the Plaintext Podcast with your host Dave Lewis, Global Advisory CISO for Duo Security, now part of Cisco. The pair discusses how Casey got started in security, how the security market is changing and the pandemic-driven boom in remote work. See the video at the blog post. Like what you hear?
Rather than Microsoft's normal crude in-yer-face full-on marketing , it's a reasonably subtle, well-balanced, comprehensive and interesting presentation. A glossy, nicely-constructed and detailed PowerPoint slide deck by Microsoft Security caught my beady this morning. Thank you MS for releasing it.
Meg Diaz is the leader of the Cisco Cloud Security product marketing organization at Cisco, where she is responsible for the go-to-market strategy and execution across multiple products. Ask three infosec pros and you’ll get three different answers. Diaz has experience in network, endpoint, cloud, and data security.
This is not a marketing report to toss in your swag bag and ignore; this is a report to cuddle up with and read over and over again. Where are we going with security program outcomes?
We covered the new rules on July 31, with some thoughts from InfoSec leaders. Sam Masiello , CISO at The Anschutz Corporation, had this to say back in July: "I would expect that many CISOs today are feeling as if their job just got harder and now has a brighter spotlight shining specifically on them.
I have a CISO peer who calls himself a 'compulsive interviewer' where he finds himself talking to wait staff, bartenders, retail workers, hospitality workers, those who show unique problem solving skillsworking under pressure or applying pattern matching to anticipate a problem and fixing it before it appears.
The potential loss of reputation from a privacy breach is a clarion call for business executives and CISOs. Data detection and response: Monitor incremental and evolving data usage and storage location and enable InfoSec & Privacy teams to enact appropriate permission and access controls changes effectively and efficiently.
Distractions and diversions are all too frequently stealing time away from security awareness professionals, forcing them to tend to non-critical tasks while setting aside their core responsibilities of developing a strong internal infosec culture. Brian Johnson, chief security officer at Armorblox, and former CISO at LendingClub.
What started as a humble collection of small, antivirus software firms is now a sprawling global market worth more than $150 billion, and with projected growth of more than 10% annually over the next decade. Infosec is one of the most demographically lopsided industries around in terms of gender.
Saying ‘zero trust is a journey’ is far too easy for marketers like me, but for practitioners trying to eliminate excessive trust – everywhere – it just adds to the already Sisyphean vibe. Charting an outcome-driven zero trust program Disclaimer: The word ‘journey’ can annoy many seasoned IT and cybersecurity pros. And I get it.
As Wendy Nather , Head of Advisory CISOs, Duo Security at Cisco so eloquently puts it at the beginning of the report, “This is not a marketing report to toss in your swag bag and ignore; this is a report to cuddle up with and read over and over again. In fact, this report will change how we think about running infosec programs.”.
As I immersed myself in foreign concepts around the information security industry, marketing, and business practices at scale, I grew to appreciate not just the technology we were building at Duo, but the people who built it, the diverse audiences that we addressed, and the unique problems-to-solve around security at large.
Several weeks ago, we were thrilled to learn that our Founder and Chief Technology Officer, Satya Gupta, was named CTO of the Year in the 2021 Global InfoSec Awards. . What is the biggest challenge facing CTOs in the high-tech market today? . Where do you see the cybersecurity market in five years? .
Its a recognition of Impervas market-leading solutions and ability to protect customers from DDoS attacks, malicious bots, business logic abuse, and more. Global Infosec Awards At the 2024 RSA Conference, Imperva nabbed an astounding eleven Cyber Defense Magazine Global InfoSec Awards.
The relationship between enterprises and insurers, like the cyber insurance market itself, is evolving. That’s quite the incentive for insurers to assert themselves in this market. Yes, insurance companies may with certain policies they offer demand a bare minimum in cybersecurity/infosec mitigation tools and solutions,” he said. “It
It starts with a strong foundation: a unified mission that breaks down the traditional silos between “security” (personnel-focused) and “InfoSec” (network-focused IT). These tools look inward, not outward, as do many security tools on the market today. Deborah Watson, Resident CISO, Proofpoint.
Danielson started out in engineering, and Stack in marketing. SC Media spoke to both women recently about their own experiences, the evolution of diversity in the information security market, and the power of pink. But I kind of came at things like, “Hey, I’m a smart enough marketer. It was different. We got noticed.
Brian Levine is senior director of product security at Axway, a global security engineering organization delivering training, tools, processes and DevSecOps practices for secure applications and cloud services to the enterprise market. Krishna Vedula is chief operating officer at 365 Retail Markets.
Craig Froelich, chief information security officer of Bank of America Merrill Lynch, described how cybersecurity is not just a technology risk during a 2017 annual meeting of the Securities Industry and Financial Markets Association. Craig Froelich, CISO at Bank of America. billion institution’s data and financial assets.
This is bewildering, scary stuff, especially for relatively inexperienced infosec or cybersecurity professionals who seldom set foot outside of the IT domain. At the CISO, Information Security Manager or Privacy Officer level, the view is no less scary despite narrower knowledge gaps. Documented! Maintained!
Of the 13 engineers who commented for this publication, none felt that the marketing associated with the products they were working on was completely accurate with respect to advertised capabilities. The paper explores those areas as well as malicious uses of ML and DL, specifically in social engineering and phishing.
As organisations work to improve their ability to manage information risk, the importance of having a Chief Information Security Officer (CISO) is also being recognised. Organisations should also look to people from other disciplines, with skills that are less obviously relevant, such as logistics, marketing and sales.
Because many of these jobs are jobs that didn't exist until lately, it probably means that recent graduates as newcomers to the job market—or anyone else, for that matter—don't have enough understanding of what these jobs actually entail," said Lisa Plaggemier , Executive Director of the National Cybersecurity Alliance. "It
Its a recognition of Impervas market-leading solutions and ability to protect customers from DDoS attacks, malicious bots, business logic abuse, and more. Global Infosec Awards At the 2024 RSA Conference, Imperva nabbed an astounding eleven Cyber Defense Magazine Global InfoSec Awards.
Thinking forward, virtual working presents opportunities for global collaboration on an unprecedented scale, with reduced costs, increased efficiencies, access to a global talent pool and of course global markets. so, how things going with your security strategy development, dear CISO? Wider still, what about our (global!)
Knowing where data are and what level of criticality to assign to the data is difficult and important, and requires significant collaboration among information security (infosec) and IT operations teams.
In the words of Duo Security’s Head of Advisory CISOs Wendy Nather, “This is not a marketing report to toss in your swag bag and ignore …this report will change how we think about running infosec programs.” Having an integrated technology stack also helps with recruiting and retaining security teams.
Welcome to the Ask Chloé column on Security Boulevard! Each week, Chloé provides advice to readers’ questions to help guide them as they navigate the technology industry. This week, Chloé answers questions about the use of the term ‘cyber’ and how to best start implementing diversity, equity and inclusion best practices.
Instead, GRC products can shift to being true performance monitoring dashboards, allowing those products to broaden their scope while continuing to adapt other capabilities, such as those related to the so-called "SOAR" market (Security Orchestration, Automation, and Response).
The fact is that they'd hired a new General Counsel who also claimed a security background (he had a CISSP), and thus they made him the CISO. I had been struggling to get paper topics approved and was fighting against the reality that the target audience for Gartner research is not the leading edge of thinking, but the middle of the market.
Dd (Catharina) Budiharto is the founder of Cyber Point Advisory LLC, a fractional CISO firm providing cybersecurity advisory services to small and mid-size businesses (SMBs). She was a CISO for several Oil and Gas companies and was a past chairperson for the American Petroleum Institute (API) IT Security Sub-Committee.
I removed Yahoo and eBay because they were dying due to market forces unrelated to security breaches, and OPM because it’s part of the government. But that seems to be a case of chasing away investors more than the stock market or customers. It’s just interesting to me that Adobe is still the market leader.
Chrome is the most widely used browser by market share, and reports like in PC Magazine highlighted that rival browsers have been blocking third-party cookies for years. Valerie Lyons, and Todd Fitzgerald, CISO, cybersecurity and privacy leadership author. The launch takes place at Dogpatch Labs in Dublin, from 6.30
Government actions will increase: Expect more government regulations, state-sponsored cyberattacks, and increased documentation required to protect CISOs. AI-Improved Security Many vendors began marketing AI-enhanced products years ago, and experts see continuing development of AI as an advantage for improved cybersecurity.
“In 2021, attackers noticed that major data breaches or ransomware attacks could influence a company’s stock and brand reputation, and public announcements could disrupt customers, partners and business markets. Tyler Farrar, CISO, Exabeam. Infosec will dominate our lives in the tech space for the foreseeable future. In the U.S.,
Keatron Evans, principal security researcher, Infosec Institute. Tom Garrubba, CISO, Shared Assessments. Ryan Yackel , vice president of product marketing, Keyfactor. President Biden’s order was drafted with heavy involvement from actual cybersecurity experts, and this is encouraging.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content