Remove CSO Remove Security Defenses Remove Technology
article thumbnail

Beyond Awareness: How to Cultivate the Human Side of Security

CyberSecurity Insiders

By Amanda Fennell, CSO and CIO, Relativity. Sophisticated security tools and well-constructed processes can help insulate an organization from the relentless cyberattacks that are part of the digital reality businesses face every day and everywhere. People are the linchpin in any organization’s security posture—and the wildcard.

CSO 131
article thumbnail

SOC modernization: 8 key considerations

CSO Magazine

We are at a point where the scale and complexity of historical security defenses either aren’t working or are stretched to their limits. This means CISOs need to think about security transformation, and as they do, every process and layer of the security technology stack is in play.

CISO 86
article thumbnail

Vulnerability Recap 9/9/24 – Exploited Vulnerabilities Persist

eSecurity Planet

Last week’s vulnerability news highlighted major security problems that affect a wide range of technologies. Sevco’s CSO Brian Contos states, “6% of all IT assets have reached EOL, and known but unpatched vulnerabilities are a favorite target for attackers.” to address the problem.

Firmware 109