This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Mitre’s CVE’s program—which provides common naming and other informational resources about cybersecurity vulnerabilities—was about to be cancelled , as the US Department of Homeland Security failed to renew the contact. It was funded for eleven more months at the last minute. This is a big deal.
The post Report finds women are declining CISO/CSO roles appeared first on TechRepublic. Professional risk factors into career decisions, and successful women need to encourage other women to accept the risks, says Accenture.
In this post, Tenable CIO Patricia Grant looks at how the CIO/CSO relationship is key to a successful exposure management program. When I first joined Tenable, one of the first things I did was sit down with our CSO, Robert Huber , to align on how we were going to work together. So, my advice to fellow CIOs: Stay close to your CSO.
Security and Exchange Commission (SEC) recently laid down the hammer charging and fining four prominent cybersecurity vendors for making misleading claims in connection with the SolarWinds hack. Joe Nicastro , Field CTO, Legit Security Nicastro Transparency in cybersecurity remains a complex balancing act.
98% of enterprises want CSOs, but 56% of industrial businesses don't have plans to introduce one to their company, according to a new Kaspersky report.
KrebsOnSecurity reviewed the Web sites for the global top 100 companies by market value, and found just five percent of top 100 firms listed a chief information security officer (CISO) or chief security officer (CSO). Not that these roles are somehow more or less important than that of a CISO/CSO within the organization.
Any lingering indifference to cybersecurity risk has evaporated in the face of spiking ransomware attacks, software supply chain threats , and the challenges of securing remote workers. That’s the clear message of CSO’s Global Intelligence Report: The State of Cybersecurity in 2021, fielded via online survey in May and June of this year.
Like most CSOs, Joe Sullivan was drawn to the role to help prevent cybercrimes. His role as CSO of Uber was something of a shift from his previous job prosecuting cybercriminals as an assistant US attorney, but closer to the tip of the cybersecurity spear.
Joe Sullivan, the former Chief Security Officer (CSO) of Uber, has been sentenced to three years’ imprisonment and 200 hours of community service for covering up a cyber attack on the company’s servers in 2016, which led to a data breach affecting over 50 million riders and drivers.
Cybersecurity has steadily crept up the agenda of governments across the globe. This has led to initiatives designed to address cybersecurity issues that threaten individuals and organizations.
I am proud to say that the annual Life and Times of Cybersecurity Professionals report from ESG and ISSA is now available for free download. As part of the research for this report, we always ask cybersecurity professionals several questions about the global cybersecurity skills shortage. Sign up for CSO newsletters. ].
A review of the executives pages published by the 2022 list of Fortune 100 companies found only four — BestBuy , Cigna , Coca-Cola , and Walmart — that listed a Chief Security Officer (CSO) or Chief Information Security Officer (CISO) in their highest corporate ranks. Nor is the average pay hugely different among all these roles.
Over the past two years, the rise of big-ticket ransomware attacks and revelations of harmful software supply chain infections have elevated cybersecurity to the top of the government's agenda. Get the latest from CSO by signing up for our newsletters. ] Learn the The 5 types of cyberattack you're most likely to face. |
Both efforts aim to prepare the nation for the next significant cybersecurity incidents, making up for lost time due to the previous administration's relative inattention to the topic. Get the latest from CSO by signing up for our newsletters. ]. Learn what you need to know about defending critical infrastructure. |
Cybersecurity buzzwords and buzz phrases are a dime a dozen. Learn 8 pitfalls that undermine security program success and 12 tips for effectively presenting cybersecurity to the board. Sign up for CSO newsletters. ]. Here are the 11 cybersecurity buzzwords and phrases that should be laid to rest in 2021.
Learn 12 tips for effectively presenting cybersecurity to the board and 6 steps for building a robust incident response plan. Sign up for CSO newsletters. ]. Marinkovic says CISOs instead need to find metrics that provide actionable information that they and the other enterprise leaders can then use to make decisions.
The US General Accountability Office (GAO) issued the 19-page report , “Cybersecurity and Information Technology: Federal Agencies need to Strengthen Efforts to Address High-Risk Areas” on July 29. Learn 12 tips for effectively presenting cybersecurity to the board and 6 steps for building a robust incident response plan.
The cybersecurity mantra at Jefferson Health is “if we can’t do it well, we’re not going to do it” says Mark Odom, CISO of the Philadelphia-based healthcare organization. Get the latest from CSO by signing up for our newsletters. ]. Get the latest from CSO by signing up for our newsletters. ].
Get the latest from CSO by signing up for our newsletters. ] It is a companion project to the company’s ATT&CK framework. While complementary, the two projects are very different. Review the best Mitre D3FEND advice to harden Windows networks. | To read this article in full, please click here
Get the latest from CSO by signing up for our newsletters. ] Piled on top of that is a growing wave of ransomware and software supply chain attacks. . Learn the The 5 types of cyberattack you're most likely to face. | To read this article in full, please click here
(Source: ISACAs Tech Workplace and Culture 2025 report, March 2025) For more information about recruiting and retaining cybersecurity professionals: 10 Ways to Boost Cybersecurity Talent Retention (InformationWeek) 60% of cybersecurity pros looking to change employers (CSO) The cybersecurity industry has an urgent talent shortage.
One of my friends, Greg van der Gaast tells this great story that perfectly illustrates one of the biggest challenges we face in cybersecurity today. ” This simple analogy speaks volumes about how cybersecurity operates today. To achieve true resilience in cybersecurity, we need to break out of this tech-first mindset.
Cybersecurity professionals interested in raising their profiles as subject matter experts can count on social media to become more visible. Step 1: Define your cybersecurity area of expertise and what success mean to you. With everyone being online this may not be enough though.
million people was exposed in a data breach lasts year, prompting AppOmni CSO Cory Michal to say that data collection companies like DISA and National Public Data need more oversight, regulations, and penalties. The post DISA Breach Highlights Need for Stronger Oversight: AppOmni CSO appeared first on Security Boulevard.
In Q&A format, they share about their professional journeys, unique experiences, and hopes for the future of cybersecurity—along with some personal anecdotes. Get to know Dr. Fred Kwong Q : Why did you decide to pursue cybersecurity as a career path? Q : How would you describe your feelings about cybersecurity in one sentence?
Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) called buffer overflow vulnerabilities unforgivable defects that put national and economic security at risk. For more information about the threat from quantum computing: Is Quantum Computing a Cybersecurity Threat?
That is why, for this October’s Cybersecurity Awareness Month , we encourage you to Do Your Part #BeCyberSmart! Cybersecurity First at Work. Owning your role in cybersecurity can seem cumbersome when approached by someone outside the security industry. Cybersecurity First at Home. Don’t make passwords easy to guess.
In a move that has raised concerns about the company's cybersecurity posture, Amy Bogac, Clorox's CISO, has stepped down from her position. Some speculate that Bogac may have been frustrated with the company's slow response to the cyberattack and its lack of investment in cybersecurity measures.
Though often overlooked in favor of cybersecurity, physical security is equally important. Get the latest from CSO by signing up for our newsletters. ]. And, indeed, it has grown into a $30 billion industry. All the firewalls in the world can’t help you if an attacker removes your storage media from the storage room.
Every chief security executive knows that one of the most important—and perhaps challenging—aspects of the job is getting the funding needed to support the cybersecurity program. Sign up for CSO newsletters. ]. Learn the 5 key qualities of successful CISOs, and how to develop them and 7 security incidents that cost CISOs their jobs.
Learn 12 tips for effectively presenting cybersecurity to the board and 6 steps for building a robust incident response plan. Sign up for CSO newsletters. ]. As with any business software decision, the password manager discussion starts with requirements, specifically regarding features.
Understanding why this is happening and exploring what lies ahead is essential for organizations aiming to sustain effective cybersecurity leadership. The growing complexity of regulatory requirements, such as the SEC's new cybersecurity reporting rules , adds another layer of strain.
Effective partnerships between CISOs and their cybersecurity vendors are integral to security success. A well-oiled relationship built on trust, communication and mutual understanding can reap significant benefits for a business’s cybersecurity posture.
Neurodiversity within cybersecurity is progressively becoming a topic of regular, meaningful discussion across the sector. To read this article in full, please click here (Insider Story)
Learn 12 tips for effectively presenting cybersecurity to the board and 6 steps for building a robust incident response plan. Sign up for CSO newsletters. ].
Seasoned CISOs/CSOs understand the importance of effectively communicating cyber risk and the need for investment in cybersecurity defense to the board of directors. To ensure cybersecurity becomes a strategic part of the corporate culture, it is crucial for CISOs to present the topic in a clear, concise, and compelling manner.
Cybersecurity pros interested in metrics and measures frequently ponder and pontificate on what measures would be best to show the board of directors. Coming up with cybersecurity metrics from a business perspective can be a challenge. That can be a tricky proposition because “we have to speak like the business” is also a mantra.
In Q&A format, they share about their professional journeys, unique experiences, and hopes for the future of cybersecurity—along with some personal anecdotes. Get to know Ryan Mostiller Q : Why or how did you decide to pursue cybersecurity as a career path? Q : What are the biggest challenges facing the cybersecurity profession?
Cybersecurity continues to be high on the agenda of governments across the globe, with both national and local levels increasingly working to counter cybersecurity threats. Here are 22 notable cybersecurity initiatives introduced around the world in 2022.
Anyone who ever attended an RSA conference understands that cybersecurity vendors introduce hundreds of amazing, innovative products every year. That means enterprises need to deploy SD-WAN, secure access service edge (SASE) and zero trust network access (ZTNA). But C-level execs aren’t looking for the flashiest new point products.
” Also read: Cybersecurity Employment in 2022: Solving the Skills Gap. My advice for anybody that asks me which certifications they should get is this: find a certification in a subject that you wish to learn about,” Palo Alto Networks CSO Rick Howard said. “If Also read: How to Get Started in a Cybersecurity Career.
I don’t know how many times I’ve heard cybersecurity professionals say something like, “Not having multi-factor authentication is a huge risk for our organization.” The cybersecurity piece of this typically focuses on incidents where these outcomes were caused by an intelligent adversary.)
Google has announced a new entry-level cybersecurity certificate to teach learners how to identify common risks, threats, and vulnerabilities, as well as the techniques to mitigate them.
"Basically, every organization that uses this tool is at risk of losing their AI models, having an internal server compromised, and having their AWS account compromised," Dan McInerney, a senior security engineer with cybersecurity startup Protect AI, told CSO. It's pretty brutal." To read this article in full, please click here
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content