Tag: business
-
CISOs must translate cyber threats into business risk
To manage risk effectively and secure board-level buy-in, CISOs must stop talking about technology and start speaking the language of business, according to a senior Check Point executive First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366625493/CISOs-must-translate-cyber-threats-into-business-risk
-
Cybersecurity Snapshot: Experts Issue Best Practices for Migrating to Post-Quantum Cryptography and for Improving Orgs’ Cyber Culture
Tags: access, attack, best-practice, business, cio, ciso, communications, computer, computing, conference, corporate, crypto, cryptography, cyber, cybersecurity, data, defense, email, encryption, finance, government, group, ibm, identity, incident, incident response, infrastructure, jobs, lessons-learned, metric, microsoft, mitre, monitoring, nist, risk, service, strategy, technology, threat, tool, training, update, vulnerability, vulnerability-management, warfareCheck out a new roadmap for adopting quantum-resistant cryptography. Plus, find out how your company can create a better cybersecurity environment. In addition, MITRE warns about protecting critical infrastructure from cyber war. And get the latest on exposure response strategies and on CISO compensation and job satisfaction. Dive into five things that are top of…
-
Beware: Fake AI Business Tools Spreading Hidden Ransomware
As small businesses increasingly adopt artificial intelligence (AI) tools to streamline operations, cybercriminals are seizing the opportunity to deploy ransomware through deceptive campaigns. According to a recent report by Cisco Talos, attackers are masquerading as legitimate AI software providers, embedding malware within counterfeit applications that mimic popular services. With 98% of small businesses using at…
-
CISOs urged to push vendors for roadmaps on post-quantum cryptography readiness
No ‘forklift upgrade’ needed: There is a misconception that change is difficult but the task of modernizing systems to make them PQC-ready can be broken down into chunks, advised Anne Leslie, cloud risk and controls leader for EMEA at IBM.”Businesses can only go as fast as partners and suppliers,” Leslie cautioned.Madelein van der Hout, senior…
-
Elevating the CISO to Business Enabler With CRQ – Kovrr
Articles related to cyber risk quantification, cyber risk management, and cyber resilience. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/06/elevating-the-ciso-to-business-enabler-with-crq-kovrr/
-
Odoo Employee Database Allegedly Exposed and Put Up for Sale on Dark Web
A data breach has reportedly struck Odoo, a leading Belgian provider of open-source business management software. On June 5, 2025, a 63.4MB employee database”, allegedly sourced through a “collaborative effort with a senior insider””, was advertised for sale on a dark web forum. The seller is demanding $25,000 in Monero (XMR) or Bitcoin (BTC) for…
-
Redefining Cyber Value: Why Business Impact Should Lead the Security Conversation
Security teams face growing demands with more tools, more data, and higher expectations than ever. Boards approve large security budgets, yet still ask the same question: what is the business getting in return? CISOs respond with reports on controls and vulnerability counts but executives want to understand risk in terms of financial exposure, operational impact,…
-
Get out of the audit committee: Why CISOs need dedicated board time
Tags: ai, business, ciso, cyber, cybersecurity, data, framework, mitigation, resilience, risk, risk-management, strategy, technology, threat, updateThe full partnership model between CISO and board: Full and frank security discussions are more than just a ‘nice to have’. The SEC has indicated it expects public companies with senior leadership to be transparent in how they assess and communicate cybersecurity risks.By extension, CISOs have an important role in communicating risks to senior leadership…
-
Attackers fake IT support calls to steal Salesforce data
Over the past several months, a threat group has been actively breaching organizations’ Salesforce instances and exfiltrating customer and business data, Google Threat … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/06/04/salesforce-vishing-attacks/
-
CrowdStrike CEO: Subscription Deals Surging As Falcon Flex Is A ‘Home Run’
CrowdStrike saw newly added total account value from its Falcon Flex subscription model surge during its latest quarter, helping to drive business in newer product categories such as Next-Gen SIEM, CrowdStrike CEO George Kurtz said Tuesday. First seen on crn.com Jump to article: www.crn.com/news/security/2025/crowdstrike-ceo-subscription-deals-surging-as-falcon-flex-is-a-home-run
-
Cybersecurity’s ‘rare earth’ skills: Scarce, high-value, and critical for future defense
Tags: ai, attack, business, ciso, computing, crypto, cryptography, cyber, cybersecurity, data, defense, detection, intelligence, jobs, programming, risk, skills, strategy, supply-chain, technology, threat, trainingAdvanced threat hunting expertise Like the rarest elements, professionals who can proactively identify novel threats and adversary techniques before they cause damage are scarce and extremely valuable. Why are these skills rare? Many factors have led to this scenario:Complex skill requirements: Effective threat hunters need a unique combination of skills, including deep cyber knowledge, programming…
-
6 ways CISOs can leverage data and AI to better secure the enterprise
Tags: advisory, ai, antivirus, attack, automation, breach, business, ciso, cloud, compliance, computer, corporate, cyber, cyberattack, cybersecurity, data, detection, firewall, framework, governance, guide, infrastructure, LLM, login, ml, network, programming, risk, risk-analysis, service, siem, soc, software, technology, threat, tool, trainingEmphasize the ‘learning’ part of ML: To be truly effective, models need to be retrained with new data to keep up with changing threat vectors and shifting cyber criminal behavior.”Machine learning models get smarter with your help,” Riboldi says. “Make sure to have feedback loops. Letting analysts label events and adjust settings constantly improves their…
-
Cyber Attacks Are Up 47% in 2025 AI is One Key Factor
Another key factor is that ransomware has turned into a business model, Check Point researchers report. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-cyber-attacks-check-point/
-
What Tackling the SaaS Security Problem Means to Me
By Kevin Hanes, CEO of Reveal Security When I reflect on the years I spent leading one of the world’s largest Security Operations Centers (SOCs) and incident response teams, the lessons learned aren’t just war stories”¦they’re a playbook for how we should rethink our responsibilities in the face of today’s fast-evolving attack surfaces. Back then,…
-
The Role of Continuous Integration and Continuous Deployment (CI/CD) in DevOps
Modern software development demands rapid delivery of high-quality applications that can adapt to changing business requirements and user… First seen on hackread.com Jump to article: hackread.com/continuous-integration-continuous-deployment-ci-cd-devops/
-
Posture ≠Protection
CSPM, DSPM, ASPM, SSPM, ESPM, the alphabet soup of Security Posture Management (SPM) tools promises visibility into risk. They map misconfigurations, surface exposure paths and highlight policy gaps. That can be useful. But let’s not confuse awareness with action. They don’t block threats.They don’t enforce controls.They don’t prevent breaches. SPMs detect, then delegate. A ticket.…
-
How AI-powered SOCs Can Boost Business for MSSPs
First seen on scworld.com Jump to article: www.scworld.com/perspective/how-ai-powered-socs-can-boost-business-for-mssps
-
Beyond Perimeter Defense: Making Attack Surface Management a Business Enabler
As cyber threats outpace traditional perimeter defenses, organizations face mounting risks in their digital transformation efforts. This article examines how Outpost24’s continuous attack surface management transforms security into a strategic business enabler, equipping CISOs, CIOs, and IT Directors with automated visibility and insights to pursue innovation with confidence and resilience. First seen on techrepublic.com Jump…
-
Launch of e92spark extends distie’s options
Distributor establishes fresh division to enable the business to capture emerging vendors bringing innovative technology to market First seen on computerweekly.com Jump to article: www.computerweekly.com/microscope/news/366625159/Launch-of-e92spark-extends-disties-options
-
Was ist BusinessMail-Compromise
Business-E-Mail-Compromise, kurz BEC, ist eine raffinierte Form des Cyberbetrugs, bei dem Angreifer legitime geschäftliche E-Mail-Kommunikation manipulieren oder fälschen, um Unternehmen zu finanziellen oder datentechnischen Verlusten zu bringen. Was passiert bei BEC? Beim Business-E-Mail-Compromise, auch häufig als CEO-Fraud bzw. Chef-Betrug, bezeichnet gibt sich ein Cyberkrimineller meist als eine vertrauenswürdige Person innerhalb des Unternehmens aus […]…
-
CISO Roles Take on Strategic Security Leadership Roles Beyond Cybersecurity as Organizations
A comprehensive analysis of over 800 Chief Information Security Officers reveals a fundamental transformation in the cybersecurity leadership landscape, with CISOs increasingly assuming strategic business responsibilities that extend far beyond traditional information security functions. The fifth annual CISO Compensation and Budget Survey conducted by IANS and Artico Search demonstrates that the modern CISO role is…

