Remove CISO Remove Marketing Remove Threat Detection
article thumbnail

LW ROUNDTABLE — How 2024’s cyber threats will transform the security landscape in 2025

The Last Watchdog

Hurd Wayne Hurd , VP of Sales, Luminys Video Surveillance as a Service (VSaaS) advancements will provide more accurate threat detection that allows security teams to focus on real risks, minimizing false alarms. Security teams will need to address the unique risks posed using LLMs in mission critical environments. The hard part?

article thumbnail

Q&A: Why SOAR startup Syncurity is bringing a ‘case-management’ approach to threat detection

The Last Watchdog

Last Watchdog had the chance to visit with Michael Sutton, former longtime CISO of cloud security vendor Zscaler, who recently signed on as advisor to a fresh, new SOAR startup, Syncurity. In addition, I see more and more service providers adopting SOAR, as the MSSP and MDR markets grow at 15% and 30% respectively according to Gartner.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The CISO: Guardian of Data while Navigating Risk Strategic Insights for the Boardroom and Shaping Future Business

Thales Cloud Protection & Licensing

The CISO: Guardian of Data while Navigating Risk Strategic Insights for the Boardroom and Shaping Future Business madhav Thu, 12/05/2024 - 06:03 CISOs have one of the most vital roles in organizations today. As a CISO, you must elevate your organization’s data security posture. Examples of both are on page 6 of the CISO Guide.

CISO 62
article thumbnail

LW ROUNDTABLE:  Predictive analytics, full-stack visualization to solidify cyber defenses in 2025

The Last Watchdog

FIPS-203 enables legal PQC deployment, prompting CISOs to overhaul encryption strategies. Despite widespread cloud adoption, most SecOps teams rely on outdated, on-premises alert tools, leading to missed threats and wasted resources on false positives.

Risk 173
article thumbnail

On Trust and Transparency in Detection

Anton on Security

Some of us remember the early days of the network IDS intrusion detections systems were delivered without customers being able to see how the detections worked . The market spoke, and these vendors are all dead and buried by Snort and its descendants, who opened their detection signatures for both review and modification.

article thumbnail

Secure Communications: Relevant or a Nice to Have?

Jane Frankland

But as a CISO or cyber risk owner, it’s not just about locking down sensitive informationits about doing it without slowing down your people. According to Microsoft’s Digital Dfense Report 2024 , 37% of the 600 million attacks they face daily can be attributed to nation-state threat actors. But it doesnt stop there.

article thumbnail

2021 Security Outcomes Study: Stress Relief for CISOs

Cisco Security

This affected all levels of the cybersecurity landscape, and it has had a particularly broad impact for those in the C-Suite, specifically, the Chief Information Security Officer (CISO). So, what is an already over-stressed CISO to do? Building a Cybersecurity Platform for the Future.

CISO 122