This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Even among top tech firms, less than half list a chief technology officer (CTO). KrebsOnSecurity reviewed the Web sites for the global top 100 companies by market value, and found just five percent of top 100 firms listed a chief information security officer (CISO) or chief security officer (CSO).
A review of the executives pages published by the 2022 list of Fortune 100 companies found only four — BestBuy , Cigna , Coca-Cola , and Walmart — that listed a Chief Security Officer (CSO) or Chief Information Security Officer (CISO) in their highest corporate ranks. Nor is the average pay hugely different among all these roles.
Both efforts aim to prepare the nation for the next significant cybersecurity incidents, making up for lost time due to the previous administration's relative inattention to the topic. Get the latest from CSO by signing up for our newsletters. ]. Learn what you need to know about defending critical infrastructure. |
The US General Accountability Office (GAO) issued the 19-page report , “Cybersecurity and Information Technology: Federal Agencies need to Strengthen Efforts to Address High-Risk Areas” on July 29. Learn 12 tips for effectively presenting cybersecurity to the board and 6 steps for building a robust incident response plan.
The number of cybersecurity mergers and acquisitions deals in 2021 set a record pace. Many of the 2021 transactions CSO reported were in the identity and cloud security markets, especially toward the end of the year. The first three quarters of the year saw 151 transactions in the industry, according to 451 Research.
Today, the convergence of operational technology (OT) and IT networks is accelerating because organizations can use the data collected by physical equipment and Industrial Internet of Things (IIoT) devices to identify issues and increase efficiency. However, IT/OT convergence also means cybersecurity is even more critical.
In Q&A format, they share about their professional journeys, unique experiences, and hopes for the future of cybersecurity—along with some personal anecdotes. He has been in the information security and technology field for the past 20 years working in education, financial, telecommunication, healthcare, and insurance sectors.
If your company is participating in the global supply chain, either as a first-party purchaser of goods and services from other organizations, or as a third-party supplier, sooner or later you’ll encounter the NIST Cybersecurity Framework. They are the people who brought you 36 inches in a yard,” Wrenn observed.
Though often overlooked in favor of cybersecurity, physical security is equally important. Get the latest from CSO by signing up for our newsletters. ]. . | Get the latest from CSO by signing up for our newsletters. ]. And, indeed, it has grown into a $30 billion industry. To read this article in full, please click here
That means cybersecurity training and education so that key stakeholders understand the risks that businesses are facing, and which strategies are most effective for protection. Who should receive cybersecurity training in your organization? How much depends on the extent of the CIO’s involvement in cybersecurity.
In this Spotlight Podcast, host Paul Roberts talks with Chris Walcutt, the CSO of DirectDefense about the rising cyber threats facing operational technology (OT) and how organizations that manage OT - including critical infrastructure owners can best manage increased cyber risks to OT environments. Read the whole entry. »
In 2020, we saw cybersecurity move from a technical problem to become a business enabler. In 2022, we will see 5G go from new technology to a business enabler bringing previously unimaginable use cases because of its high bandwidth and lower latency. 5G began its disruptive charge in 2021, and this will continue to accelerate in 2022.
Deepfake technology is an escalating cybersecurity threat to organizations. Get the latest from CSO by signing up for our newsletters. ] Get the latest from CSO by signing up for our newsletters. ] Learn what makes these 6 social engineering techniques so effective. | To read this article in full, please click here
She is accused of trade secret theft and economic espionage after allegedly stealing bisphenol-A-free (BPA-free) technologies owned by several companies, including her former employers Coca-Cola and Eastman Chemical Company. The value placed on the development of the stolen technologies is $119.6 Sign up for CSO newsletters. ].
In a move that has raised concerns about the company's cybersecurity posture, Amy Bogac, Clorox's CISO, has stepped down from her position. Some speculate that Bogac may have been frustrated with the company's slow response to the cyberattack and its lack of investment in cybersecurity measures.
In May 2021, the GAO’s director of information technology and cybersecurity, Vijay A. Get the latest from CSO by signing up for our newsletters. ]. D’Souza, testified before Congress on supply chain risks.
Learn 12 tips for effectively presenting cybersecurity to the board and 6 steps for building a robust incident response plan. Sign up for CSO newsletters. ]. Schmitt, who is now in her early 30s, has always been passionate about technology, so she didn't buy into this. She shouldn't worry—maybe it's just stress.
But this time, it is the Treasury Inspector General for Tax Administration auditing the IRS, the agency's legacy IT environment and its cybersecurity. How massive is the IRS information technology infrastructure? billion to operate its current information technology infrastructure, nearly $2.04 The Audit's conclusion?
And while ML has frequently been used to make sense of big data—to improve business performance and processes and help make predictions—it has also proven priceless in other applications, including cybersecurity. Why Machine Learning Has Become Vital for Cybersecurity The need for machine learning has to do with complexity.
Deploying the latest, greatest detection technology to deter stealthy network intruders will take companies only so far. I had the chance to sit down with Kris Lahiri, CSO and co-founder of Egnyte , one of the original EFSS market leaders. Egnyte is in a good position to champion the cause.
The data-reliance of digital banking means an AI-driven approach to cybersecurity and risk management is integral to success, UnionDigital Bank CISO Dominic Grunden tells CSO. Working together, the two used autonomous technology to instill a “truly holistic” AI-enhanced security and risk management strategy.
In my last CSO article , I detailed cybersecurity professionals’ opinions on the characteristics of a mature cyber-threat intelligence (CTI) program. Alas, most CTI programs are far from mature, but this may change over the next few years as most enterprise organizations bolster CTI program investment.
In Q&A format, they share about their professional journeys, unique experiences, and hopes for the future of cybersecurity—along with some personal anecdotes. He is active in CIO Roundtables, CISO Chicago, the Chicago Life Sciences Consortium, and the Technology Leaders' Association. Get to know Glenn Kapetansky. Answer: Energized.
Nowadays you need a scorecard to keep track of the monthly acquisitions and mergers in the cybersecurity industry. cybersecurity M&A deals hit 151 in the first three quarters of 2021, compared to 80, 88 and 94 in 2018, 2019 and 2020, respectively, according to data from 451 Research. In fact, the volume of U.S.
Seasoned CISOs/CSOs understand the importance of effectively communicating cyber risk and the need for investment in cybersecurity defense to the board of directors. To ensure cybersecurity becomes a strategic part of the corporate culture, it is crucial for CISOs to present the topic in a clear, concise, and compelling manner.
The oath Marene Allison took years ago to defend and protect the United States is the same tenet that now guides her work maintaining cybersecurity at one of the largest pharmaceutical and consumer packaged goods manufacturers in the world.
The security of critical infrastructure has been high on the agenda in 2023, with cyberattacks and other risks posing a persistent threat to the technologies and systems relied upon for essential services such as energy, food, electricity, and healthcare.
Mergers and acquisitions (M&A) have the potential to introduce significant cybersecurity risks for organizations. Assumptions about connecting networks, ‘rationalizing’ IT and cybersecurity platforms and staff are generally made with limited knowledge of the actual functions and work performed in each organization,” Saylor says.
Asset disposal normally isn’t one of those burning topics that is top-of-mind for CISOs, yet every CISO must be able to address it when asked to describe their information technology asset disposal (ITAD) program. Learn 12 tips for effectively presenting cybersecurity to the board and 6 steps for building a robust incident response plan.
2022 has been a heavy year for layoffs in the technology sector. Although perhaps less severely affected, cybersecurity vendors haven’t been immune. Some of the biggest tech companies in the world have announced significant staff cuts, including Amazon, Twitter, Meta, and Salesforce.
While enterprises tout their efforts to accelerate digital transformation efforts, for security leaders in business there is a dark side to the rapid deployment of new technology. Meanwhile, CSOs also must help ensure their organizations are in compliance with new regulations.
Cybersecurity spending in the coming year may not be recession-proof, but it's likely to be recession-resistant. Still, pressure remains on security leaders to prioritize technologies that generate the most bang for the buck. Forrester released a report Tuesday to help organizations do just that.
Your questions about deception technology in cybersecurity, answered. What exactly is deception technology and how can it play a vital part in your cyber defense? How do you define deception technology? The old word for deception technologies is honeypot. The old technology really no longer applies.
We need to take user protection seriously, change the security paradigm, by studying and building protections around people and processes, rather than solely focusing on technology. What are the most important cybersecurity risks for 2021? I recently published a new piece in CNN offering solutions. Ransomware is at the top.
Watch this beneficial conversation between two great professionals in tech and cybersecurity. Kindly share on social media to raise awareness for the empowerment and accomplishments of women in technology. Together, Debby and Tyler shared valuable insights and advice. To read this article in full, please click here
The rapid emergence of Open AI’s ChatGPT has been one of the biggest stories of the year, with the potential impact of generative AI chatbots and large language models (LLMs) on cybersecurity a key area of discussion.
In fact, the #1 cybersecurity concern listed was insider breaches. Insider breaches are growing – because you can actually see them In their annual look at trends in cyber security , Forrester made a few startling revelations: 33% of your breaches in 2021 are going to be insider threat related.
In Q&A format, they share about their professional journeys, unique experiences, and hopes for the future of cybersecurity—along with some personal anecdotes. Get to know Ryan Mostiller Q : Why or how did you decide to pursue cybersecurity as a career path? Q : What are the biggest challenges facing the cybersecurity profession?
Nowadays, companies are showing a lot of interest in offering products loaded with connected technology. And unless these devices are secure enough, their usage can invite more troubles,” said Alistair MacGibbon, the CSO of CyberCX.
” Also read: Cybersecurity Employment in 2022: Solving the Skills Gap. My advice for anybody that asks me which certifications they should get is this: find a certification in a subject that you wish to learn about,” Palo Alto Networks CSO Rick Howard said. “If Also read: How to Get Started in a Cybersecurity Career.
It was fitting that the opening keynote panel for SecureWorld Chicago on June 8th was titled " Making the Cybersecurity Music: Navigating Challenges and Opportunities in Today's InfoSec Landscape. Well, information security, cybersecurity happens to be a critical part of the business, being able to achieve strategic objectives.
Paul speaks with Caleb Sima, the CSO of the online trading platform Robinhood, about his journey from teenage cybersecurity phenom and web security pioneer, to successful entrepreneur to an executive in the trenches of protecting high value financial services firms from cyberattacks. Caleb Sima is the CSO at Robinhood.
Addressing the shortage of skilled cybersecurity professionals, Malwarebytes on Wednesday launched Malwarebytes MDR (managed detection and response), pairing EDR (end point detection and response) technology with a dedicated team of security analysts, providing both automated and human lines of defense.
Just a few months past the initial SolarWinds discovery, it is clear that standardized cybersecurity regulation is needed to outline best practices for companies to follow. Part of this preparedness means understanding how potential legislation could reshape cybersecurity efforts. In March 2021, President Biden signed the $1.9
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content