Tag: ceo
-
TechTalk: Das nachträgliche Absichern von KI-Anwendungen ist hochriskant
Im Rahmen des Controlware Security Day 2025 durften wir mit Geschäftsführer und CEO Bernd Schwefing über zwei Dinge sprechen: Warum für seine Firma das Event wichtig ist und wie Controlware das Thema der Künstlichen Intelligenz insgesamt bewertet. Herausgekommen ist dieses gut zweiminütige Videointerview, in dem er zum einen über das Netzwerken auf solchen Events spricht.…
-
AI coding assistants amplify deeper cybersecurity risks
Tags: access, ai, api, application-security, attack, authentication, business, ceo, ciso, cloud, compliance, control, cybersecurity, data, data-breach, detection, fintech, flaw, governance, injection, leak, LLM, metric, open-source, programming, radius, risk, risk-management, service, software, startup, strategy, threat, tool, training, vulnerability‘Shadow’ engineers and vibe coding compound risks: Ashwin Mithra, global head of information security at continuous software development firm Cloudbees, notes that part of the problem is that non-technical teams are using AI to build apps, scripts, and dashboards.”These shadow engineers don’t realize they’re part of the software development life cycle, and often bypass critical…
-
Barracuda Hires Ex-RSA Chief Rohit Ghai As New CEO
Barracuda Networks announced Tuesday that it has hired longtime cybersecurity executive Rohit Ghai as its new CEO to succeed Hatem Naguib, who has stepped down. First seen on crn.com Jump to article: www.crn.com/news/security/2025/barracuda-hires-ex-rsa-chief-rohit-ghai-as-new-ceo
-
Lean Teams, Higher Stakes: Why CISOs Must Rethink Incident Remediation
Big companies are getting smaller, and their CEOs want everyone to know it. Wells Fargo has cut its workforce by 23% over five years, Bank of America has shed 88,000 employees since 2010, and Verizon’s CEO recently boasted that headcount is “going down all the time.” What was once a sign of corporate distress has…
-
6 novel ways to use AI in cybersecurity
Tags: access, ai, attack, authentication, business, ceo, cloud, cyberattack, cybersecurity, data, defense, detection, email, infrastructure, intelligence, malicious, malware, network, phishing, risk, service, tactics, technology, threat, tool, training2. Machine-learning generative adversarial networks: Michel Sahyoun, chief solutions architect with cybersecurity technology firm NopalCyber, recommends using generative adversarial networks (GANs) to create, as well as protect against, highly sophisticated previously unseen cyberattacks. “This technique enables cybersecurity systems to learn and adapt by training against a very large number of simulated threats,” he says.GANs allow…
-
6 novel ways to use AI in cybersecurity
Tags: access, ai, attack, authentication, business, ceo, cloud, cyberattack, cybersecurity, data, defense, detection, email, infrastructure, intelligence, malicious, malware, network, phishing, risk, service, tactics, technology, threat, tool, training2. Machine-learning generative adversarial networks: Michel Sahyoun, chief solutions architect with cybersecurity technology firm NopalCyber, recommends using generative adversarial networks (GANs) to create, as well as protect against, highly sophisticated previously unseen cyberattacks. “This technique enables cybersecurity systems to learn and adapt by training against a very large number of simulated threats,” he says.GANs allow…
-
AI-powered phishing scams now use fake captcha pages to evade detection
The attack playbook: The phishing campaigns follow a familiar playbook at the outset. Victims typically receive spam emails that carry urgent, action-oriented messages such as “Password Reset Required” or “USPS Change of Address Notification”.Clicking on the embedded link doesn’t take the user directly to a credential-stealing site but instead loads what appears to be a…
-
European airports continue to crawl after a cyberattack on Collins’ MUSE systems
Tags: access, breach, ceo, cyberattack, data, exploit, group, india, infrastructure, risk, service, threat, vulnerabilityShared infrastructure and systemic risk: Collins Aerospace’s MUSE platform serves many airports’ check-in and baggage drop systems, meaning a fault there ripples across multiple nations. Brussels, Heathrow, Berlin and Dublin all reported impacts. Frankfurt and Paris airports were relatively spared, showing that usage of the compromised system varies.”Although information is still limited, the disruption at…
-
AI-powered phishing scams now use fake captcha pages to evade detection
The attack playbook: The phishing campaigns follow a familiar playbook at the outset. Victims typically receive spam emails that carry urgent, action-oriented messages such as “Password Reset Required” or “USPS Change of Address Notification”.Clicking on the embedded link doesn’t take the user directly to a credential-stealing site but instead loads what appears to be a…
-
Das schwächste Glied in der Kette: Sind Sie ein VAP?
Tags: ceoCyberkriminelle kennen das schwächste Glied in der Kette genau. Wissen Sie es auch? Cyberkriminelle studieren nicht das Organigramm eines Unternehmens. Sie studieren die Zugriffsmuster. Während sich Sicherheitsteams auf den Schutz des CEO konzentrieren, nehmen Angreifer den Facility-Koordinator mit Gebäudezugangsrechten oder den Personalchef, der Lieferantenverträge genehmigt, ins Visier. Dies sind besonders gefährdete Personen (Very Attacked… First…
-
Why Attackers Still Hoard Encrypted Data (and Why That Should Worry You)
Ron Zayas, CEO of Ironwall, tackles a sobering question: why do attackers keep harvesting encrypted data”, and why are organizations so complacent about it? Zayas notes that it’s not just “foreign” apps scooping up information; domestic platforms often collect just as much. The real issue is that organizations and individuals alike have adopted a mindset…
-
Study Finds 1.2M Medical Devices Exposed on Internet
Default credentials, weak passwords, misconfigurations and a variety of other security shortcomings are exposing millions of medical devices and their data on the internet, said Soufian El Yadmani, CEO and co-founder of Modat, who shared recent research findings. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/interviews/study-finds-12m-medical-devices-exposed-on-internet-i-5494
-
CrowdStrike CEO George Kurtz On ‘Incredible’ SIEM Advantage Vs. Network-Focused Vendors
CrowdStrike’s surging momentum in areas such as Next-Gen SIEM and massive traction on platform consolidation show that the vendor’s “pace of innovation” is stronger than ever, CrowdStrike Co-founder and CEO George Kurtz said Wednesday. First seen on crn.com Jump to article: www.crn.com/news/security/2025/crowdstrike-ceo-george-kurtz-on-incredible-siem-advantage-vs-network-focused-vendors
-
AI is altering entry-level cyber hiring, and the nature of the skills gap
The certification trap and broken pipelines: Other experts argued that an over reliance on CVs and certifications is one of the biggest barriers to hiring success in cybersecurity because it acts to shut out otherwise qualified candidates.”Despite bringing valuable experience and perspectives, people with 10 years of work experience are put off because there is…
-
Remedio Secures $65M to Tackle Patch and Vulnerability Gaps
Startup Plans Unified Remediation for Misconfigurations and Patching, Compliance. Remedio has landed $65 million in funding to develop tools that go beyond detection and automate secure remediation. CEO Tal Kollender says the goal is faster growth, a bigger U.S. sales footprint, and delivering a platform that closes the gap between risk visibility and action. First…
-
Wir beseitigen die traditionellen Kompromisse, die SIEM-Plattformen plagen!
Im Interview spricht Andy Grolnick, CEO vom SIEM-Sicherheitsanbieter Graylog, über den Mangel an Security-Spezialisten, welche Funktionen SIEM-Plattformen zwingend haben sollten und wie Unternehmen sich bis Ende des Jahres verbessern können. Erzählen Sie uns etwas mehr über Graylog. Was unterscheidet das Unternehmen von anderen IT-Sicherheitsanbietern? Wir beseitigen die traditionellen Kompromisse, die SIEM-Plattformen plagen; das ist… First…
-
George Kurtz’s 5 Boldest AI Statements At CrowdStrike Fal.Con 2025
CrowdStrike is making its next moves in AI including with a focus on enabling a Security Operations Center (SOC) that is fundamentally powered by agentic technologies, the “agentic SOC,” CrowdStrike co-founder and CEO George Kurtz said Tuesday. First seen on crn.com Jump to article: www.crn.com/news/security/2025/george-kurtz-s-5-boldest-ai-statements-at-crowdstrike-fal-con-2025
-
Check Point To Buy AI Cybersecurity Startup Lakera To Boost Agentic AI Security
Check Point to acquire AI cybersecurity startup Lakera to boost AI security for enterprise customers around LLMs, AI agents and multimodal workflows, says CEO Nadav Zafrir. First seen on crn.com Jump to article: www.crn.com/news/security/2025/check-point-to-buy-ai-cybersecurity-startup-lakera-to-boost-agentic-ai-security
-
Eve Security Launches AI Platform to Secure AI Agent Interactions
Eve Security today made available an observability and policy enforcement platform that is designed to use artificial intelligence (AI) agents to ensure that other AI agents are not accessing IT resources without permission. Fresh off raising $3 million in seed funding, Eve Security CEO Nadav Cornberg said instead of requiring a person to be in..…
-
Eve Security Launches AI Platform to Secure AI Agent Interactions
Eve Security today made available an observability and policy enforcement platform that is designed to use artificial intelligence (AI) agents to ensure that other AI agents are not accessing IT resources without permission. Fresh off raising $3 million in seed funding, Eve Security CEO Nadav Cornberg said instead of requiring a person to be in..…
-
Eve Security Launches AI Platform to Secure AI Agent Interactions
Eve Security today made available an observability and policy enforcement platform that is designed to use artificial intelligence (AI) agents to ensure that other AI agents are not accessing IT resources without permission. Fresh off raising $3 million in seed funding, Eve Security CEO Nadav Cornberg said instead of requiring a person to be in..…
-
CrowdStrike CEO George Kurtz: ‘Huge Service Opportunity’ Ahead For Partners
CrowdStrike is looking to accelerate opportunities for partners to deliver services across its Falcon security platform, with a special focus on fast-growing products including Next-Gen SIEM and identity security, CrowdStrike Co-founder and CEO George Kurtz said Monday. First seen on crn.com Jump to article: www.crn.com/news/security/2025/crowdstrike-ceo-george-kurtz-huge-service-opportunity-ahead-for-partners
-
CrowdStrike CEO George Kurtz: ‘Huge Service Opportunity’ Ahead For Partners
CrowdStrike is looking to accelerate opportunities for partners to deliver services across its Falcon security platform, with a special focus on fast-growing products including Next-Gen SIEM and identity security, CrowdStrike Co-founder and CEO George Kurtz said Monday. First seen on crn.com Jump to article: www.crn.com/news/security/2025/crowdstrike-ceo-george-kurtz-huge-service-opportunity-ahead-for-partners
-
CISOs grapple with the realities of applying AI to security functions
Tags: ai, automation, breach, business, ceo, ciso, compliance, cybersecurity, data, detection, email, endpoint, finance, governance, incident response, intelligence, law, malicious, malware, microsoft, risk, service, soc, threat, toolThe agentic edge: The financial services is often an early adopter of cutting-edge security technologies.Erin Rogers, SVP and director of cybersecurity risk and compliance at BOK Financial, tells CSO that AI-based upgrades are helping threat detection and response systems to autonomously analyze threats, make real-time decisions, and adapt responses, significantly improving early detection and mitigation.While…
-
CISOs grapple with the realities of applying AI to security functions
Tags: ai, automation, breach, business, ceo, ciso, compliance, cybersecurity, data, detection, email, endpoint, finance, governance, incident response, intelligence, law, malicious, malware, microsoft, risk, service, soc, threat, toolThe agentic edge: The financial services is often an early adopter of cutting-edge security technologies.Erin Rogers, SVP and director of cybersecurity risk and compliance at BOK Financial, tells CSO that AI-based upgrades are helping threat detection and response systems to autonomously analyze threats, make real-time decisions, and adapt responses, significantly improving early detection and mitigation.While…
-
CEO DEEPFAKE CALL: Bei Anruf Awareness-Training zum Thema Vishing
First seen on datensicherheit.de Jump to article: www.datensicherheit.de/ceo-deepfake-call-anruf-awareness-training-vishing
-
Ping Identity CEO: Bots Disrupt Identity, Trust Is ‘On Fire’
Durand: Agentic Models Require Stronger Verification and Complex Access Controls. With bots and personal agents poised to reshape digital identity, Ping Identity CEO Andre Durand says organizations must harden onboarding, reimagine omni-channel strategies and deploy verified trust services to combat fraud and deepfakes, especially in workforce and third-party access. First seen on govinfosecurity.com Jump to…
-
Australian Banks Deploy Army of AI Bots to Scam Scammers
Apate.ai CEO Dali Kaafar on Turning the Tables on Fraudsters With AI-Powered Bots. Major banks in Australia are now using bots to foil scammers. The bots are designed to pose as potential victims, extract real-time intelligence and waste scammers’ resources. The data is then pushed directly into fraud detection systems used by banks, telecom providers…
-
Fünf KI-Use-Cases für CISOs
Tags: access, ai, business, ceo, cio, ciso, cybercrime, cybersecurity, cyersecurity, data, framework, google, incident response, mail, microsoft, phishing, rat, risk, risk-management, service, siem, soc, tool, vpn, vulnerability, vulnerability-management -
Fünf KI-Use-Cases für CISOs
Tags: access, ai, business, ceo, cio, ciso, cybercrime, cybersecurity, cyersecurity, data, framework, google, incident response, mail, microsoft, phishing, rat, risk, risk-management, service, siem, soc, tool, vpn, vulnerability, vulnerability-management

