This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
KrebsOnSecurity reviewed the Web sites for the global top 100 companies by market value, and found just five percent of top 100 firms listed a chief information security officer (CISO) or chief security officer (CSO). Not that these roles are somehow more or less important than that of a CISO/CSO within the organization.
However, CSO's investigation shows that the bug bounty platforms have turned bug reporting and disclosure on its head, what multiple expert sources, including HackerOne's former chief policy officer, Katie Moussouris, call a "perversion." [.]. Bug bounties are best when transparent and open. Leitschuh, the Zoom bug finder, agrees.
A review of the executives pages published by the 2022 list of Fortune 100 companies found only four — BestBuy , Cigna , Coca-Cola , and Walmart — that listed a Chief Security Officer (CSO) or Chief Information Security Officer (CISO) in their highest corporate ranks. Nor is the average pay hugely different among all these roles.
Many of the 2021 transactions CSO reported were in the identity and cloud security markets, especially toward the end of the year. This trend is likely to continue as these markets consolidate. In all markets, larger firms are looking to expand their capabilities. That’s up from 94 for the same period in 2020.
recently teamed up and found evidence of an emerging market for stolen and spoofed machine identities. This emerging black market for machine identities is but a mere starting point for cyber criminals who recognize a huge, unguarded exposure when they see one. At the end of the day the CSO the CIO and the CEO all left the company.
Used to simplify complex terminology or boost sales and marketing campaigns, buzzwords are an inescapable reality for an innovative and fast-paced industry like information security. Sign up for CSO newsletters. ]. Cybersecurity buzzwords and buzz phrases are a dime a dozen. To read this article in full, please click here
Cyber insurance policies are becoming more diverse as the market matures, and the finer details regarding what one policy may cover can be somewhat different to another, depending on several factors.
Get the latest from CSO by signing up for our newsletters. ]. It is hard to believe that BlackBerry’s legal, PR, and marketing teams would choose this approach given the millions of consumers in the vehicle, medical, infrastructure world who might be bitten. Learn what you need to know about defending critical infrastructure. |
Sign up for CSO newsletters. ]. Still, it is clear that the impacts of the COVID-19 pandemic are largely the driving force behind the dramatic increase in the infosec job market. To read this article in full, please click here
Suex, which has been accused by US officials of doing business with ransomware actors in the past, has had its access to US markets cut off as a result. Get the latest from CSO by signing up for our newsletters. ] To read this article in full, please click here
Cyber insurance policies are becoming more diverse as the market matures, and the finer details regarding what one policy may cover can be somewhat different to another, depending on several factors.
But Forrester analyst Steve Turner notes that in his recent conversations with enterprise clients, a good 50%-70% completely misunderstand the basic concepts and principles of zero trust “because the marketing hype has taken over.”. Get the latest from CSO by signing up for our newsletters. ] Learn the 7 tenets of zero trust. |
Could such variations trigger changes in the cyber insurance market and, if so, how will they impact insurance carriers and organizations? Get the latest from CSO by signing up for our newsletters. ]. Learn the 7 keys to better risk assessment. | Shifting ransomware priorities impacting claim costs.
Cyber insurance policies are becoming more diverse as the market matures, and the finer details regarding what one policy may cover can be somewhat different to another, depending on several factors.
The disruption of Genesis Market is yet another successful takedown that proves that public-private partnerships are vital in fighting cybercrime,” said John Fokker, head of threat intelligence at the Trellix Advanced Research Center in Amsterdam. “The To read this article in full, please click here
These efforts recently escalated with an attack launched from a hijacked email marketing account belonging to USAID and targeted around 3,000 people across over 150 organizations in 24 countries. Sign up for CSO newsletters. ].
Get the latest from CSO by signing up for our newsletters. ]. The second being “poor software security and current market development of ‘build, sell, and maybe patch later.’” If that is the case, then they are hard of hearing as this klaxon has been sounding for many years, as company after company fends off ransomware attacks.
Experienced security leaders know that criminals are constantly evolving and changing their tactics to stay one step ahead of defense mechanisms. New “upgrades” to Raccoon Stealer, a widely-used information stealing malware, is a perfect example of this.
To helps organizations compare their needs against the options in the market, CSO prepared a list with the top seven vendors in the market. Marketers want to collect data about customers and their devices.
"Security technology can seem overwhelming to a security analyst, let alone a layperson, so we built the user interface hand-in-hand with our customers through an early access program," explains Bitdefender vice president for product and technical marketing Amy Blackshaw.
That's why a company called Portnox announced Wednesday a cloud-native TACACS+ solution that it claims is easy to set up and use, as well as priced within the reach of mid-market companies. It's been out for a long time, but no one has a cloud-based solution," Portnox CEO Denny LeCompte tells CSO. TACACS+ is a standard protocol.
(Source: ISACAs Tech Workplace and Culture 2025 report, March 2025) For more information about recruiting and retaining cybersecurity professionals: 10 Ways to Boost Cybersecurity Talent Retention (InformationWeek) 60% of cybersecurity pros looking to change employers (CSO) The cybersecurity industry has an urgent talent shortage.
Enterprise risk management (ERM) , is the process of assessing risks to identify both threats to a company’s financial well-being and opportunities in the market. For more background, read CSO 's explainer on ERM or our article on risk management mistakes CISOs still make.)
Organizations in developed countries are not as prepared for cybersecurity incidents compared to those in developing countries, according to Cisco's Cybersecurity Readiness Index, released today.
Another company was caught in a cloud misconfiguration issue as Wegmans Food Markets on Thursday notified its customers that two of its cloud databases were left open to potential outside access. A Wegmans store at the Hilltop Village Center in Alexandria, Virginia. Ser Amantio di Nicolao, CC BY-SA 3.0 link] , via Wikimedia Commons).
Prior to launching CyberSaint, Wrenn was CSO of Schneider Electric, a supplier of technologies used in industrial control systems. An entire community of expertise surrounds this, so that it actually yields a much better framework than some of the proprietary frameworks in the market, where you have to buy them and license them every year.”
The market for you and your device’s location is enormous and growing. It is the holy grail of marketing, and infosec’s nightmare. Companies that produce location-tracking algorithms and technological magic are riding the hyper-personalized marketing rocket, which continues to expand at breathtaking speed. from 2022 to 2030.
According to an official document from the Unites States District Court, Western District of Texas Waco Division, Webroot is seeking damages for lost sales, profits, and market share. Webroot seeks damages against Trend Micro, claims lost sales and market share. The complaint has raised eyebrows within the sector and on social media.
The first relates to reports that there was no Chief Security Officer (CSO) in place. It was rare to find a dedicated figurehead on the board, with the exception of major banks and finance houses because of the regulated markets they operated in. Fast forward to today and its rare not to have a CSO for very obvious reasons.
The global cyber insurance market was valued at $13.33 North America is projected to dominate the market due to increasing cyberattacks, particularly ransomware, and a high risk of data loss, while Europe will also gain a prominent market share, in part because “digitalization among organizations remains vulnerable to malicious cyberattacks.”
Marketing technology, or 'martech', keeps getting more complex and more vital to the way companies do business. Salesforce is the CRM market leader by a wide margin, with 19.8% market share, according to research firm IDC.
He began as a marketing manager in 1997 and started AWS in 2003. The surprise announcement that Jeff Bezos will leave later this year and hand over the reins to AWS leader Andy Jassy marks a remarkable rise for Jassy.
Social media app Clubhouse has been on the market for less than one year and it’s already facing privacy-related court filings and fallout from a user data leak that has been exploited , in which a user recorded and shared private conversations, user login information, and metadata to another website.
Mergers and acquisition (M&A) of products, capabilities, and companies has become a common strategy for business and market growth. Please see graphic from S&P Global Market Intelligence. According to CSO, 2021 shaped up to be an active year for mergers and acquisitions in the cybersecurity industry.
By Amanda Fennell, CSO and CIO, Relativity. Think about an individual on the product marketing team or in engineering, operations, communications or human resources. To borrow a concept from marketing, think about personas in a meaningful way and try to understand the exact message that resonates with different audiences.
In his book The Context Marketing Revolution : How to Motivate Buyers in the Age of Infinite Media , author Mathew Sweezey (who also heads up market strategy at Salesforce) argues that the key to breaking through the infinite media noise and reaching customers is context. Sounds amazing!
Can our new product launch hit the market before the competitors shift their own strategies? Do we know enough about the geopolitical climate in a new market to justify the added costs and hassles in compliance and governance? Will expanding the sales staff generate enough profit to more than pay for the added costs?
The cybercrime underground has long functioned as an open market where sellers of products and services are paired with buyers and contractors. One of the most valuable commodities on this market are stolen credentials since they can provide attackers with access into networks, databases, and other assets owned by organizations.
Palo Alto Networks and Deloitte have announced the expansion of their existing alliance to offer managed security services to their shared U.S. The move will see Palo Alto’s cybersecurity technology portfolio become available in outcome-based, managed offerings from global consulting giant Deloitte, the firms said in a press release.
The partnership may be indicative of the modern threat detection and response market. Cybereason XDR, powered by Google Chronicle, is designed to work at speed across the entire enterprise – including endpoints, networks, identities, cloud and workspaces. Joint platform consolidates attack defense, ends solution silos.
Multiple analysts report that the SD-WAN market is in the billions of dollars, with an annual growth rate in the 25% to 35% range. Managed service providers and carriers globally are increasingly deploying managed SD-WAN services to reach new markets.
Ransomware has increased nearly 1100% over the last year according to FortiGuard Labs research , impacting organizations of all sizes and across all market sectors.
I had the chance to sit down with Kris Lahiri, CSO and co-founder of Egnyte , one of the original EFSS market leaders. This nascent trend derives from a cottage industry of tech vendors in the “ content collaboration platform ” (CCP) space, which evolved from the earlier “ enterprise file sync and share ” (EFSS) space.
This has happened as the cybercrime cartels have evolved beyond wire transfer frauds to target market strategies, take over brokerage accounts, and island-hop into banks, according to the report.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content