This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
A review of the executives pages published by the 2022 list of Fortune 100 companies found only four — BestBuy , Cigna , Coca-Cola , and Walmart — that listed a Chief Security Officer (CSO) or Chief InformationSecurity Officer (CISO) in their highest corporate ranks.
What is even scarier: Not having systems in place to protect against malware and other cyberthreats. CyberThreats That Frighten Even The Experts. It's not just malware that poses a threat to an enterprise's systems. Sweet Solutions to CyberThreats. The CIS Community Defense Model v2.0
The Chief InformationSecurity Officer (CISO) has become one of the most critical roles in modern organizations. Tasked with safeguarding data and infrastructure, CISOs face mounting pressures as cyberthreats escalate, regulatory demands grow, and the role expands to encompass strategic business responsibilities.
Conducted in spring 2024, the study captures insights from Chief InformationSecurity Officers of all 50 U.S. states and the District of Columbia, marking a period where the impact of COVID-19 has subsided yet new threats have surfaced.
The Upper Midwest US state, located smack in the middle of the country just below the border with Canada, is already using AI to help it deal with cyberthreats in a more efficient, cost-effective manner. To read this article in full, please click here
According to recent research over 60 percent of survey participants stated their executives are only “somewhat” or “not at all” informed about the informationsecurity risk and threats their organizations face. In commenting on the results, I stated this lack of awareness is “astounding.”
The role of a Chief InformationSecurity Officer (CISO) is undeniably complex, yet incredibly rewarding. Similarly, SolarWinds and its Chief InformationSecurity Officer faced fraud and internal control failure charges from the SEC. RELATED: Uber CSO Found Guilty: The Sky Is Not Falling.
Those stats come from ISACAs Tech Workplace and Culture 2025 report, which is based on a survey of about 7,700 of its members who work in IT areas such as informationsecurity, governance, assurance, data privacy and risk management.
Even through the Covid19 pandemic, trends in acquisition and consolidation of informationsecurity oriented companies remained quite strong. According to CSO, 2021 shaped up to be an active year for mergers and acquisitions in the cybersecurity industry. Top cybersecurity M&A deals for 2021 | CSO Online.
(Source: 138 webinar attendees polled by Tenable, February 2025) Interested in learning how Tenables security team uses Tenable Cloud Security to safeguard our cloud environments? Kirsten Gillibrand (D-N.Y.)
These days, information technology (IT) and informationsecurity professionals know this all too well, especially when it comes to configuration assessments. Cyberthreats demand identification and remediation. There's an old adage in business: If you're not measuring, you're not managing.
In this Spotlight Podcast, sponsored by RSA, we take on the question of securing the 2020 Presidential election. Given the magnitude of the problem, could taking a more risk-based approach to security pay off? Given the magnitude of the problem, could taking a more risk-based approach to security pay off?
My advice for anybody that asks me which certifications they should get is this: find a certification in a subject that you wish to learn about,” Palo Alto Networks CSO Rick Howard said. “If GSEC is intended for anyone new to cybersecurity who has some background in information systems and networks.
Plus, a recent report by the Mineta Transportation Institute doubled down on the need for C-level security and technical expertise—for instance, hiring a chief security officer (CSO) or chief informationsecurity officer (CISO).
Security leaders face the dual challenge of needing to stay competitive in a rapidly evolving business landscape while also defending against increasingly serious cyberthreats, reducing complexity, and facilitating their organization’s digital transformation.
A CISO who builds relationships with key stakeholders can gain their support for security initiatives and get them to comply with security policies and procedures. A CISO who is able to manage change can implement new security measures in a way that minimizes disruption to the business.
Sonatype has discovered more malware in the npm registry which, following our analysis and multiple cyberthreat intelligence reports, has led to the discovery of a novel and large scale malware campaign leveraging the open-source ecosystem.
As defenders of digital assets, Chief InformationSecurity Officers (CISOs) and cybersecurity professionals face immense pressure, often leading to burnout. The report claims that a 600% rise in cyberthreats since the COVID-19 pandemic has led to increased stress levels for those working in the cybersecurity sector.
VoIP phishing and impersonation also victimized millions of corporate employees across the world , contributing to an even greater cyberthreat. Cloud security success and choosing the right investments is all about having a clear understanding of threat types and their resulting damages.
Cyber attacks nowadays do not often come from ingenious ‘hackers’ in dark rooms, they’re often the result of an employee reusing the same password, or businesses not implementing basic practices such as multi-factor authentication. By acting smart now, we can eliminate some of the greatest cyberthreats facing our businesses today.”
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content