Tag: ceo
-
What it takes to win that CSO role
Tags: access, ai, attack, automation, business, ceo, ciso, cloud, compliance, control, cybersecurity, data, defense, finance, flaw, framework, google, identity, insurance, jobs, monitoring, network, resilience, risk, skills, startup, strategy, technology, threatGovern the explosion of shadow AI and establish guardrails for generative AI before it creates material data leakage.Move beyond prevention and operate as a business enabler, proving the organization can maintain a minimum viable business during a sustained outage.Address compliance burdens, such as SEC disclosure rules or the EU AI Act, not as a checklist,…
-
What it takes to win that CSO role
Tags: access, ai, attack, automation, business, ceo, ciso, cloud, compliance, control, cybersecurity, data, defense, finance, flaw, framework, google, identity, insurance, jobs, monitoring, network, resilience, risk, skills, startup, strategy, technology, threatGovern the explosion of shadow AI and establish guardrails for generative AI before it creates material data leakage.Move beyond prevention and operate as a business enabler, proving the organization can maintain a minimum viable business during a sustained outage.Address compliance burdens, such as SEC disclosure rules or the EU AI Act, not as a checklist,…
-
An AI Agent Didn’t Hack McKinsey. Its Exposed APIs Did.
This week’s McKinsey incident should be a wake-up call for every enterprise moving fast to deploy AI. Not because AI itself is inherently insecure. But because too many organizations are still thinking about AI security at the model layer, while the real enterprise risk sits in the action layer: the APIs, MCP servers, internal services,…
-
Bold Launches With $40M to Target AI Risks on Endpoints
New Startup Says Cloud-Heavy Models Do Not Scale for Large Enterprises. Bold Security exited stealth with $40 million to build an endpoint platform for the artificial intelligence era. CEO Nati Hazut said companies can no longer rely on older controls as employees and AI agents access data locally, creating new blind spots around apps, files…
-
Alex Karp: Palantir-CEO skizziert Trump-freundliche Agenda
In einem Interview betont Alex Karp die Vorteile von KI für die Arbeiterklasse und den Machtverlust, den gebildete Wähler erleiden könnten. First seen on golem.de Jump to article: www.golem.de/news/alex-karp-palantir-ceo-skizziert-trump-freundliche-agenda-2603-206472.html
-
Alex Karp: Palantir-CEO skizziert Trump-freundliche Agenda
In einem Interview betont Alex Karp die Vorteile von KI für die Arbeiterklasse und den Machtverlust, den gebildete Wähler erleiden könnten. First seen on golem.de Jump to article: www.golem.de/news/alex-karp-palantir-ceo-skizziert-trump-freundliche-agenda-2603-206472.html
-
SentinelOne Partners ‘Rapidly Expanding Beyond The Endpoint’: CEO Tomer Weingarten
SentinelOne saw major growth in its latest quarter in numerous segments beyond its core endpoint security category, in part reflecting the rising adoption of the broader Singularity platform by MSSPs and other partners, SentinelOne Co-founder and CEO Tomer Weingarten said Thursday. First seen on crn.com Jump to article: www.crn.com/news/security/2026/sentinelone-partners-rapidly-expanding-beyond-the-endpoint-ceo-tomer-weingarten
-
Medical giant Stryker crippled after Iranian hackers remotely wipe computers
Tags: access, attack, authentication, best-practice, ceo, computer, credentials, cyber, cyberattack, data, flaw, group, hacker, identity, infrastructure, intelligence, iran, jobs, mobile, phone, service, software, supply-chain, theft, threat, updateHandala claims credit: The Handala threat group quickly claimed responsibility for the attack. While the group’s involvement is just a claim for now, Stryker employees reportedly saw a version of the Handala logo a cartoon of a Palestinian boy with his back turned and hands crossed behind him on affected devices.Handala’s identity is hard to…
-
AWS expands Security Hub for multicloud security operations
Tags: access, api, ceo, ciso, cloud, cybersecurity, data, detection, endpoint, framework, google, identity, incident response, india, infrastructure, Internet, microsoft, monitoring, risk, threat, tool, vulnerability, vulnerability-managementCross-cloud security monitoring: While AWS has not provided technical details on how it will identify vulnerabilities outside its native environment, Sanchit Vir Gogia, chief analyst at Greyhound Research, said multicloud visibility typically works by collecting signals from multiple security systems and translating them into a consistent format so they can be analysed together.A key enabler…
-
Overly permissive ‘guest’ settings put Salesforce customers at risk
Why Salesforce environments make tempting targets: Salesforce deployments are particularly attractive because of the sensitive data they hold and the complexity of their access models.”Salesforce instances often contain highly sensitive customer data, including credentials and secrets that can be used for lateral movement,” said Vincenzo Lozzo, CEO and cofounder of SlashID. At the same time,…
-
Why Old Cybersecurity Models Are Breaking
By Keven Knight, CEO, Talion There is a quiet reckoning underway in cybersecurity, and most organisations are still pretending it’s not happening. The pressure on security leaders now exceeds what dashboards, frameworks and tooling can meaningfully contain. CISOs are being held accountable for outcomes shaped long before security is engaged. They are expected to prevent…
-
Announcing the 2026 CSO Hall of Fame honorees
Tags: ai, ceo, cio, ciso, corporate, cyber, cybersecurity, finance, google, group, infrastructure, international, jobs, resilience, risk, risk-management, sans, technologySelim Aissi, CEO & CSO, AGARobert S. Allen, Global CISO & Responsible AI Officer, GallagherMohit Chanana, CISO, Chevron Phillips ChemicalEdna Conway, Chief Operations & Risk Officer, TPO GroupJuan Gomez-Sanchez, VP, Cyber Resilience, McLane Company, Inc.Gary Harbison, Global CISO, Johnson & JohnsonMalcolm Harkins, Chief Security & Trust Officer, HiddenLayerBarry Hensley, CSO, Brown & BrownShaun Khalfan, SVP,…
-
RSAC Innovation Sandbox 2026 Realm Labs
Company Overview Founded in 2023, Realm Labs is headquartered in Sunnyvale, near San Jose, California[1]. The company’s founder and CEO, Saurabh Shintre, previously led AI security research at Symantec and Splunk[2]. At this year’s RSAC conference, Realm Labs secured $5 million in funding from Crosspoint Capital Partners[3]. The company’s mission is to make AI applications “more…The…
-
Zero trust, zero buzzwords: Here’s what it means
In this Help Net Security video, Murat Balaban, CEO of Zenarmor, breaks down zero trust and zero trust network access (ZTNA) without the buzzwords. The video covers why this … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/03/11/zero-trust-network-access-video/
-
Fake LinkedIn Interview Used by Lazarus Hackers to Target AllSecure CEO
Researchers at AllSecure have revealed how North Korean hackers from the Lazarus Group used a fake LinkedIn job interview and deepfake technology to target their CEO. First seen on hackread.com Jump to article: hackread.com/fake-linkedin-interview-lazarus-hackers-allsecure-ceo/
-
Anthropic Files Lawsuit Against U.S. Government Over Claude Risk Designation
Anthropic has launched an unprecedented lawsuit against the U.S. government after being designated a >>supply chain risk>>. The legal action, filed in a California federal court, targets the executive office of President Donald Trump, Defense Secretary Pete Hegseth, and 16 government agencies. The dispute centers on Anthropic CEO Dario Amodei’s refusal to allow the military…
-
President Trump’s Cyber Strategy for America: What It Means for the U.S. and Why It Matters Globally
Tags: access, ai, awareness, business, ceo, cloud, compliance, computing, cryptography, cyber, cybercrime, cybersecurity, data, defense, exploit, governance, government, healthcare, incident response, infrastructure, intelligence, international, malicious, network, regulation, resilience, risk, skills, startup, strategy, supply-chain, technology, threat, tool, training, usa, vulnerability, zero-trustPresident Trump’s Cyber Strategy for America signals a shift toward risk-based security and cooperation across emerging technologies. While centered on U.S. interests, the strategy provides a blueprint to collectively strengthen global cyber resilience. Key takeaways Cybersecurity as a global security imperative: The strategy signals that cybersecurity has evolved beyond a mere “IT issue” to become…
-
Sean Cairncross lays out what’s coming next for Trump’s cyber strategy
The national cyber director is pitching an approach that blends cyber operations with diplomacy, law enforcement and pressure on CEOs to shore up their organizations. First seen on cyberscoop.com Jump to article: cyberscoop.com/national-cyber-director-trump-cyber-strategy-interagency-cell-critical-infrastructure-pilots/
-
Trump’s cyber strategy emphasizes offensive operations, deregulation, AI
Industry reaction and next steps: Industry reaction was broadly positive, though notably, many of the strongest endorsements came from cybersecurity firms likely to benefit from the strategy’s emphasis on AI adoption and expanded private-sector roles in national defense.Drew Bagley, chief privacy and policy officer at CrowdStrike, said in a statement, “This strategy addresses modern threats…
-
TDL – Defense Before Offense: Leadership, Risk, and the Cost of Bad Decisions – Steven Elliott
From the Battlefield to the Boardroom: Lessons in Defense In the latest episode of The Defender’s Log, host David Redekop sits down with Steven Elliott, CFO of Adam Networks, to explore the surprising parallels between military operations, financial management, and cybersecurity. A Journey of Unpredictable Paths Elliott’s background is anything but linear. From a small…
-
Only 30 minutes per quarter on cyber risk: Why CISO-board conversations are falling short
Boards want more forward-looking insights: The report also suggests that board-CISO communication doesn’t dive as deeply into details as it should in these days of ever more sophisticated, AI-driven cyberattacks.The majority of board directors (82%) say their security leaders’ reporting on regulatory trends was satisfactory or excellent, and that they had strong visibility into program…
-
New OneTrust CEO on Why AI Governance Market Is Set to Surge
New CEO John Heyman Says Enterprises Need Tools to Manage Thousands of AI Agents. New OneTrust CEO John Heyman said enterprises rapidly deploying generative AI will soon manage hundreds or thousands of AI agents across their organizations. They must monitor AI agents’ data flows and third-party technologies as privacy risk and security oversight increasingly converge.…
-
ThreatLocker CEO On How Zero Trust Expansion Makes It ‘Much Harder’ To Get Hacked
With the expansion of ThreatLocker’s deny-by-default approach to the cloud and mobile announced Thursday, the cybersecurity vendor is addressing one of the biggest challenges faced by MSPs today, CEO Danny Jenkins told CRN. First seen on crn.com Jump to article: www.crn.com/news/security/2026/threatlocker-ceo-on-how-zero-trust-expansion-makes-it-much-harder-to-get-hacked
-
Anthropic CEO Calls OpenAI’s Military Messaging ‘Straight Up Lies’
Anthropic CEO Dario Amodei is openly challenging how OpenAI describes its defense work, sharpening the debate over what AI “guardrails” really mean. The post Anthropic CEO Calls OpenAI’s Military Messaging ‘Straight Up Lies’ appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-anthropic-ceo-openai-military-messaging-lies/
-
ThreatLocker Unveils Zero Trust Network And Cloud Access: 5 Things To Know
ThreatLocker announced its expansion into offering zero trust network and cloud access tools Thursday, with the aim of delivering a massive protection boost for MSPs against phishing and network exposure threats, ThreatLocker CEO Danny Jenkins tells CRN. First seen on crn.com Jump to article: www.crn.com/news/security/2026/threatlocker-unveils-zero-trust-network-and-cloud-access-5-things-to-know
-
Next Gen Spotlights: Preparing for a Post-Quantum World QA with Cavero Quantum
As quantum computing edges closer to reality, the pressure on organisations to future-proof their security infrastructure is mounting. Cavero Quantum, a spin-out from the University of Leeds, is tackling this challenge head-on with post-quantum cryptography and authentication designed for even the most constrained devices. The Gurus spoke to James Trenholme, Co-Founder and CEO of Cavero…
-
How a Music Streaming CEO Built an Open-Source Global Threat Map in His Spare Time
Frustrated by fragmented war news, Anghami’s Elie Habib built World Monitor, a platform that fuses global data, like aircraft signals and satellite detections, to track conflicts as they unfold. First seen on wired.com Jump to article: www.wired.com/story/world-monitor-elie-habib/
-
CrowdStrike reports record quarter amid investor concerns about AI impact
CEO George Kurtz told investors the cybersecurity firm is well positioned to compete against legacy providers. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/crowdstrike-record-quarter-investor-concerns-ai/813791/
-
Iranian cyberattacks fail to materialize but threat remains acute
Tags: ai, application-security, attack, ceo, control, country, cyber, cyberattack, cybercrime, cybersecurity, defense, endpoint, finance, government, group, healthcare, infrastructure, intelligence, Internet, iran, malware, mfa, monitoring, phishing, risk, service, supply-chain, technology, threat, tool, update, vpnTargeting and response: According to Adrian Cheek, a senior cybercrime researcher at Canadian threat intelligence company Flare, the most at-risk sectors are critical infrastructure, including the defense and government supply chain, financial services, energy, and healthcare.”Water, energy, and healthcare sectors are currently the most exposed. These sectors combine high targeting priority with weak baseline security,…

