article thumbnail

LW ROUNDTABLE: Wrist slap or cultural shift? SEC fines cyber firms for disclosure violations

The Last Watchdog

Related: Technology and justice systems The U.S. Avaya Holdings , Check Point Software Technologies , and Mimecast Limited each minimized or obscured the extent of security breaches linked to the SolarWinds Orion hack, impacting investor trust and highlighting the critical importance of clear, truthful communication.

CISO 263
article thumbnail

A Chief Security Concern for Executive Teams

Krebs on Security

Even among top tech firms, less than half list a chief technology officer (CTO). KrebsOnSecurity reviewed the Web sites for the global top 100 companies by market value, and found just five percent of top 100 firms listed a chief information security officer (CISO) or chief security officer (CSO). Not anymore. EXECUTIVE SILOS.

CSO 257
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Few Fortune 100 Firms List Security Pros in Their Executive Ranks

Krebs on Security

A review of the executives pages published by the 2022 list of Fortune 100 companies found only four — BestBuy , Cigna , Coca-Cola , and Walmart — that listed a Chief Security Officer (CSO) or Chief Information Security Officer (CISO) in their highest corporate ranks. Nor is the average pay hugely different among all these roles.

CSO 241
article thumbnail

CSO's ultimate guide to security and privacy laws, regulations, and compliance

CSO Magazine

CSO's ultimate guide to security and privacy laws, regulations, and compliance Security and privacy laws, regulations, and compliance: The complete guide This directory includes laws, regulations and industry guidelines with significant security and privacy impact and requirements. NERC) standards.

CSO 128
article thumbnail

Why CISO roles require business and technology savvy

CSO Magazine

This was a few years ago, and one can only guess that the role had been created by a technologist who didn’t care about or didn’t understand the business—or, inversely by a businessperson who didn’t understand enough about technology. In either case, the disconnect is real. To read this article in full, please click here

CISO 125
article thumbnail

Recent shadow IT related incidents present lessons to CISOs

CSO Magazine

Sign up for CSO newsletters. ]. Operating within an enclaved system means direct user access to more advanced technologies from their workstations wasn’t happening. They do have the challenge of employees using technology and applications with capabilities that far outstrip their ability to keep up.

CISO 144
article thumbnail

11 technologies improving database security

CSO Magazine

Now, sophisticated tools and technologies are making it possible for database developers to have their cake and, to stay in metaphor, not count the calories by keeping the information private. Databases hold vast amounts of personal information including some very sensitive tidbits, creating headaches for the companies that must curate them.