This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Even among top tech firms, less than half list a chief technology officer (CTO). KrebsOnSecurity reviewed the Web sites for the global top 100 companies by market value, and found just five percent of top 100 firms listed a chief information security officer (CISO) or chief security officer (CSO).
A review of the executives pages published by the 2022 list of Fortune 100 companies found only four — BestBuy , Cigna , Coca-Cola , and Walmart — that listed a Chief Security Officer (CSO) or Chief Information Security Officer (CISO) in their highest corporate ranks. Nor is the average pay hugely different among all these roles.
Many of the 2021 transactions CSO reported were in the identity and cloud security markets, especially toward the end of the year. This trend is likely to continue as these markets consolidate. In all markets, larger firms are looking to expand their capabilities. That’s up from 94 for the same period in 2020.
Interest in zero trust is surging, according to IDG’s 2020 Security Priorities Study, with 40% of survey respondents saying they are actively researching zero trust technologies, up from only 11% in 2019, and 18% of organizations indicating they already have zero trust solutions, more than double the 8% in 2018.
Security endpoint protection vendor Webroot has filed a patent infringement complaint against competitor Trend Micro accusing it of implementing patented technology in its security software and systems without authorization. Webroot seeks damages against Trend Micro, claims lost sales and market share.
Security technology can seem overwhelming to a security analyst, let alone a layperson, so we built the user interface hand-in-hand with our customers through an early access program," explains Bitdefender vice president for product and technical marketing Amy Blackshaw. Bitdefender also worked on making these features easy to use.
The market for you and your device’s location is enormous and growing. It is the holy grail of marketing, and infosec’s nightmare. Companies that produce location-tracking algorithms and technological magic are riding the hyper-personalized marketing rocket, which continues to expand at breathtaking speed.
(Source: ISACAs Tech Workplace and Culture 2025 report, March 2025) For more information about recruiting and retaining cybersecurity professionals: 10 Ways to Boost Cybersecurity Talent Retention (InformationWeek) 60% of cybersecurity pros looking to change employers (CSO) The cybersecurity industry has an urgent talent shortage.
Emerging technologies such as containerization, virtualization, and edge computing are becoming more mainstream and driving cloud spending, the report said. Software as a service (SaaS) remains the largest market segment. To read this article in full, please click here
Prior to launching CyberSaint, Wrenn was CSO of Schneider Electric, a supplier of technologies used in industrial control systems. I had the chance at RSA 2019 to visit with George Wrenn, founder and CEO of CyberSaint Security , a cybersecurity software firm that plays directly in this space. In the U.S.,
“That [desire of employees to continue working from home] is doing some interesting things to salary and benefit offerings,” explains Peter Tsai, head of technology insights at Spiceworks, a professional network for IT pros based in Austin, TX. To read this article in full, please click here
Edge computing is gaining traction quickly – with some analysts deeming it the next great revolution in technology. In fact, IDC has predicted that the worldwide edge computing market will grow to $250.6 billion by 2024. To read this article in full, please click here
Mergers and acquisition (M&A) of products, capabilities, and companies has become a common strategy for business and market growth. Please see graphic from S&P Global Market Intelligence. According to CSO, 2021 shaped up to be an active year for mergers and acquisitions in the cybersecurity industry.
Education and research were the top targets for cyberattackers in 2021, with an average of 1605 attacks per organization per week, a 75% increase from 2020, according to research by Check Point Software Technologies. Pandemic’s push for digital invites threats .
Customer Perspectives A petroleum distribution business developed innovative ideas for increasing customer loyalty, but it needed to upgrade its technology infrastructure to bring those concepts to life.
The move will see Palo Alto’s cybersecurity technology portfolio become available in outcome-based, managed offerings from global consulting giant Deloitte, the firms said in a press release. Palo Alto Networks and Deloitte have announced the expansion of their existing alliance to offer managed security services to their shared U.S.
In my last blog post , I described how the market for eXtended Detection and Response (XDR) is evolving and how CISOs should approach this new and promising technology. To read this article in full, please click here (Insider Story)
Edge computing is fast becoming an essential part of our future technology capabilities. According to a recent report, the global edge computing market is expected to grow at a compound annual growth rate of 38.9% from 2022 to 2030, reaching nearly $156 billion by 2030.
This is true; Zero Trust is a new way of security thinking that permeates several areas, not just architecture or technology. Once deployed, this technology provides secure access for users, things, and workloads to public or private destinations based on Zero Trust principles.
However, it’s easy for security leaders to become overwhelmed by the sheer number of cybersecurity tools available on the market today. Fortune Business Insights projects that the global cybersecurity market will grow from $155.83 And that growth is accelerating. billion in 2022 to $376.32
The study, conducted by independent technologymarket research firm Vanson Bourne, surveyed 1000 IT professionals from organizations around the world with more than 50 employees. These included respondents from the US (300), UK (250), France (100), Germany (100), China (100), Australia (75) and Japan (75).
Based on the ESG data, these conditions aren’t just marketing hype, as 37% of SOC teams say that alert volume and complexity is making security operations more difficult. The burden of managing and maintaining all these disparate technologies alone can be difficult. Everything is growing – threats, IT, alerts, tools, everything.
Deploying the latest, greatest detection technology to deter stealthy network intruders will take companies only so far. I had the chance to sit down with Kris Lahiri, CSO and co-founder of Egnyte , one of the original EFSS market leaders.
By Amanda Fennell, CSO and CIO, Relativity. Think about an individual on the product marketing team or in engineering, operations, communications or human resources. To borrow a concept from marketing, think about personas in a meaningful way and try to understand the exact message that resonates with different audiences.
Brian Levine is senior director of product security at Axway, a global security engineering organization delivering training, tools, processes and DevSecOps practices for secure applications and cloud services to the enterprise market. John Bruggeman is chief technology officer at Hebrew Union College – Jewish Institute of Religion.
Case in point: Last week, a data loss security company, Proofpoint, filed a lawsuit against a former employee for stealing confidential sales-enablement data prior to leaving for Abnormal Security, a market rival. To carry out the alleged heist, the employee didn’t even use the type of sophisticated technology that you might expect.
The new rules aim to enhance investor protection and market efficiency by requiring: Faster Disclosure: Publicly traded companies must report material cybersecurity incidents within four business days of determining the incident's materiality. What do the new SEC rules entail?
The release is reflective of a growing trend of security products coming to market to provide advanced security for native browsers. Advanced Browser Security designed to isolate, detect and remediate web threats.
It also cites the emergence of recent technologies, and the proliferation of criminal groups, as issues increasing pressure on staff. Hack The Box commissioned an independent market research company, Censuswide, to survey two samples. 74% of business leaders report staff taking time off due to stress, fatigue, or burnout.
That rapid change in how teams communicate internally as well as with partners, suppliers, and customers introduced new security challenges, says Irwin Lazar, president and principal analyst at market research firm Metrigy. What follows are edited excerpts of that presentation.
We need to take user protection seriously, change the security paradigm, by studying and building protections around people and processes, rather than solely focusing on technology. It also puts a price on the data—which creates a market for it. Wherever there is a legitimate market, there are always bad guys trying to exploit it.
We are beyond the point of viewing Zero Trust as a simple marketing feature for information technology or cybersecurity companies. It is a floor for any technology vendor who wants to provide high-value solutions to government or commercial customers.
Specialized, pure-play security companies are being bought by bigger and more generalized technology vendors or by private firms seeking to cash in on the cybersecurity boom.
Products such as Axiado’s TCU are important developments in the market, as they answer a specific need for high-level and multi-function hardware security demands for data center technology,” said Michela Menting, senior research director at ABI Research.
This is crucial because far too many companies—especially SMBs and mid-markets—don't have the time, effort and expertise to make one. There's a lot of folks who look for the 'silver bullet' or gravitate toward emerging technologies. This should help. Why are we doing this? Plain and simple: To help the security community.
A : You never get bored with the ever-changing risks, problems, or new technology to learn about! We are no longer an insurance policy; we are now needed for our business to expand, enter new markets, acquire new customers, and establish new lines of business.
Aaron Shilts, CEO at NetSPI, is joined by Tom Parker, founder and CEO at Hubble (and new NetSPI Chief Technology Officer!) to discuss integrating the cutting-edge CAASM technology with NetSPI’s proactive security solutions all under one platform. What’s the most exciting aspect of bringing NetSPI and Hubble together?
Gartner’s 2021 Market Guide for XDR describes the technology as a way to integrate a wide array of different security tools — covering endpoints, network, email and so on — into a holistic picture. That’s particularly important in the case of mid-size companies where the in-house security team might not be particularly large.
At the company’s Cisco Live customer and partner conference in June, Cisco boldly connected the dots of a network- and cloud-based ecosystem that ties together innovative technologies to drive productivity, resiliency, and growths, while also showcasing its artificial intelligence (AI) capabilities. of the total market.
Content delivery network (CDN) and cloud security services provider Akamai Technologies has added a network cloud firewall capability to its cloud-based DDoS platform, Akamai Prolexic. To read this article in full, please click here
Developing a Clear Cybersecurity Strategy As a CISO/CSO, creating and presenting a clear cybersecurity strategy to the board of directors is crucial in fostering awareness of cyber risks and encouraging investment in cybersecurity defense.
Under the guidance of Dan Meacham, VP of Global Security and Corporate Operations and CSO/CISO, the multi-billion dollar organization transitioned from on-premises data centers to the cloud in 2012.
In a related phone privacy story, the Markup turns the spotlight on a little-known yet large market for phone location data. The technology “tears at the heart of privacy of individual citizens” but is also fallible and could be evaded by those meant to be targeted, and misused, they added. . Spoiler alert: it’s worth billions.)
This year marked the tenth anniversary of SOURCE Conference and it continues to pride itself on being one of the only venues that brings business, technology and security professionals together under one roof to focus on real-world, practical security solutions for some of todays toughest security issues.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content