Remove CSO Remove Cyber threats Remove Digital transformation
article thumbnail

The strong link between cyber threat intelligence and digital risk protection

CSO Magazine

While indicators of compromise (IoCs) and attackers’ tactics, techniques, and processes (TTPs) remain central to threat intelligence, cyber threat intelligence (CTI) needs have grown over the past few years, driven by things like digital transformation, cloud computing, SaaS propagation, and remote worker support.

article thumbnail

Deloitte-NASCIO Study: AI and Cyber Threats Reshape the Landscape

SecureWorld News

Promote the CISO's role in digital transformation. Areas such as digital identity and access management—for state workers, contractors, citizens, and businesses—should include a CISO perspective to confirm that system security is considered. Proactively participate in policy development.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

BrandPost: How to Secure the Modern Customer Experience

CSO Magazine

Learn how to counter the slow erosion of customer trust brought on by cyber threats. Securely Accelerate Digital Transformation and Customer Experiences Through Modern Identity. To read this article in full, please click here

article thumbnail

The Relevance of Privacy-Preserving Techniques and Generative AI to DORA Legislation

Thales Cloud Protection & Licensing

To address these challenges, the European Union introduced the Digital Operational Resilience Act (DORA) in 2022, designed to ensure that financial entities can withstand and recover from cyber threats while maintaining operational continuity. The world has changed.

article thumbnail

M&A Trending In Cybersecurity Industry Vertical For 2022

CyberSecurity Insiders

According to CSO, 2021 shaped up to be an active year for mergers and acquisitions in the cybersecurity industry. Top cybersecurity M&A deals for 2021 | CSO Online. It should be noted, cyber due diligence, including testing of applications, is also important for post transaction operations. In fact, the volume of U.S.

article thumbnail

Spotlight Podcast: OT Is Under Attack. Now What?

The Security Ledger

Chris Walcutt, the CSO at DirectDefense talks about the rapidly changing threat landscape that critical infrastructure owners and operators inhabit, and how savvy firms are managing OT cyber risks. Critical Infrastructure And Digital Transformation: A Risky Combination Campaigns like that aren’t new.

CSO 52
article thumbnail

BrandPost: Tips for building and maintaining a cyber-readiness framework

CSO Magazine

Now more than ever, it’s essential for companies to have a cyber response framework in place long before an attack happens. The cyber threat landscape is constantly evolving, with familiar attack tactics like ransomware , phishing, and credential abuse and theft becoming more sophisticated and destructive.