Tag: ciso
-
How CISOs Can Strengthen Supply Chain Security in 2025
by
in SecurityNewsThe responsibilities of Chief Information Security Officers (CISOs) are rapidly evolving as digital transformation and global interconnectivity reshape the modern supply chain. In 2025, the supply chain will be more than just a logistical function; it will be a complex, dynamic web of partners, vendors, and technologies, each introducing new vulnerabilities and attack vectors. High-profile…
-
The CISO’s Guide to Effective Cloud Security Strategies
by
in SecurityNewsAs organizations accelerate cloud adoption, CISOs face unprecedented challenges securing dynamic, multi-cloud environments. The shift to cloud-native architectures, hybrid workloads, and decentralized data storage has expanded the attack surface, exposing enterprises to sophisticated threats like supply chain compromises, misconfigured APIs, and insider risks. With 70% of breaches now linked to cloud assets, CISOs must balance…
-
Chase CISO condemns the security of the industry’s SaaS offerings
by
in SecurityNews
Tags: ai, api, ciso, cloud, control, crowdstrike, cybersecurity, data, defense, detection, group, identity, incident response, infrastructure, network, risk, saas, sbom, threatSolutions missing: Fritz Jean-Louis, principal cybersecurity advisor at Info-Tech Research Group, said that he generally agreed with the Chase description of the cybersecurity challenges today.”One of the key points in the letter is that the modern SaaS model concentrates sensitive data behind a handful of cloud front doors. JP Morgan itself has logged multiple third-party…
-
JPMorgan Chase CISO Warns of SaaS Security Crisis and Supply Chain Risk
by
in SecurityNewsIn an open letter, Patrick Opet, Chief Information Security Officer (CISO) at JPMorgan Chase, raises a critical alarm First seen on securityonline.info Jump to article: securityonline.info/jpmorgan-chase-ciso-warns-of-saas-security-crisis-and-supply-chain-risk/
-
Trump’s undermining of federal cyber efforts demands outrage, says ex-CISO chief Krebs
by
in SecurityNewsFirst seen on scworld.com Jump to article: www.scworld.com/brief/trumps-undermining-of-federal-cyber-efforts-demands-outrage-says-ex-ciso-chief-krebs
-
JPMorgan Chase CISO Decries Poor SaaS Cybersecurity
by
in SecurityNews‘Providers Must Urgently Reprioritize Security, Writes Patrick Opet. Banking giant JPMorgan Chase called on software as a service providers to improve cybersecurity practices in an open letter accusing them of quietly enabling cyberattackers. An attack on one major SaaS or PaaS provider can immediately ripple through its customers, wrote CISO Patrick Opet. First seen on…
-
Platform Shift: Why CISOs Are Embracing Consolidation
by
in SecurityNewsMorgan Stanley’s Keith Weiss on Economic Pressure Impact on Security Budgets. Tight budgets and data challenges are driving enterprises away from best-of-breed security solutions toward more consolidated platforms. Consolidation offers streamlined security and better data visibility and integration, said Keith Weiss, head of U.S. software research at Morgan Stanley. First seen on govinfosecurity.com Jump to…
-
Weltpassworttag Wird es der letzte sein?
by
in SecurityNewsEigentlich braucht es keinen Aufhänger, um am Weltpassworttag (1. Mai) auf die Bedeutung eines gut gewählten Passworts aufmerksam zu machen. Aber angesichts zunehmender Phishing-Angriffe holt Sophos das Thema noch einmal in die erste Reihe, denn: wenn es nach Chester Wisniewski, Director, Global Field CISO, geht, könnte es obsolet werden. Wissensbasierte Multi-Faktor-Authentifizierung (MFA) wie 6-stellige Codes…
-
Want faster products and stronger trust? Build security in, not bolt it on
by
in SecurityNewsIn this Help Net Security interview, Christopher Kennedy, CISO at Group 1001, discusses how cybersecurity initiatives are reshaping enterprise cybersecurity strategy. He … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/04/29/christopher-kennedy-group-1001-enterprise-cybersecurity-strategy/
-
Verantwortungsvolle Cybersicherheit: Der CISO im Zentrum der CSR-Strategie
by
in SecurityNewsDie Corporate Social Responsibility (CSR) erfordert heute eine strategische Verknüpfung von Cybersicherheit und Nachhaltigkeit. CISOs stellen sicher, dass Investitionen in Cybersicherheit umweltverträgliche Ziele unterstützen und somit zu einer verantwortungsvollen Unternehmensführung beitragen. Die soziale Verantwortung von Unternehmen (CSR) ist heute ein unverzichtbarer strategischer Schwerpunkt, wobei die Cybersicherheit eine Schlüsselrolle spielt. Jüngste Initiativen auf europäischer Ebene,… First…
-
JPMorgan Chase CISO warns software industry on supply chain security
by
in SecurityNewsIn an open letter, Patrick Opet said third-party vendors need to embrace secure development practices over speed to market.; First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/jpmorgan-chase-ciso–software-supply-chain-security/746476/
-
Exposure Management Works When the CIO and CSO Are in Sync
by
in SecurityNews
Tags: access, ai, attack, business, cio, ciso, cloud, control, cyber, cybersecurity, data, data-breach, endpoint, finance, infrastructure, jobs, office, risk, strategy, technology, threat, tool, update, vulnerability, vulnerability-management, zero-dayEach Monday, the Tenable Exposure Management Academy provides the practical, real-world guidance you need to shift from vulnerability management to exposure management. In this post, Tenable CIO Patricia Grant looks at how the CIO/CSO relationship is key to a successful exposure management program. You can read the entire Exposure Management Academy series here. When I…
-
Reporting lines: Could separating from IT help CISOs?
by
in SecurityNews
Tags: attack, business, cio, ciso, cyber, cybersecurity, exploit, finance, insurance, metric, mitigation, risk, risk-management, skills, technology, vulnerabilityReporting to the CFO can improve discussions about funding: There’s art and science to secure funding. Number matters in getting budget approval, and cybersecurity is at pains to be seen as more than a cost center. However, two-thirds (66%) of CFOs don’t fully understand the CISO role and have difficulty seeing the tangible return on…
-
Building A Strong Compliance Framework: A CISO’s Guide To Meeting Regulatory Requirements
by
in SecurityNewsIn the current digital landscape, Chief Information Security Officers (CISOs) are under mounting pressure to ensure their organizations meet a growing array of regulatory requirements while maintaining robust cybersecurity. The proliferation of regulations such as the General Data Protection Regulation (GDPR), Health Insurance Portability and Accountability Act (HIPAA), and Payment Card Industry Data Security Standard…
-
Risikobewertung von Drittanbietern wird zunehmend unvermeidbar
by
in SecurityNewsEinheitliche Standards fehlen sieben Tipps für trotzdem mehr Widerstandsfähigkeit. Immer mehr Sicherheitsverantwortliche erkennen: Die Risikobewertung von Drittanbietern muss angesichts der aktuellen Cyberbedrohungen eine Kernkomponente der Cyberresilienz-Strategie jedes Unternehmens werden. Dazu sind einheitliche Standards nötig. Doch die gibt es bisher nicht. Es gibt allerdings wirkungsvolle Maßnahmen, die CISOs und Compliance-Beauftragte für die Risikobewertung von… First seen…
-
Compliance And Governance: What Every CISO Needs To Know About Data Protection Regulations
by
in SecurityNewsThe cybersecurity landscape has changed dramatically in recent years, largely due to the introduction of comprehensive data protection regulations across the globe. Chief Information Security Officers (CISOs) now find themselves at the intersection of technical security, regulatory compliance, and organizational risk management. Their responsibilities have expanded far beyond traditional security operations, requiring them to interpret…
-
How to Develop a Strong Security Culture Advice for CISOs and CSOs
Developing a strong security culture is one of the most critical responsibilities for today’s CISOs (Chief Information Security Officers) and CSOs (Chief Security Officers). As cyber threats become more sophisticated and pervasive, technical defenses alone are insufficient. A resilient security posture results from embedding security awareness, responsibility, and proactive behavior into every organizational layer. This…
-
How to Develop a Strong Security Culture Advice for CISOs and CSOs
Developing a strong security culture is one of the most critical responsibilities for today’s CISOs (Chief Information Security Officers) and CSOs (Chief Security Officers). As cyber threats become more sophisticated and pervasive, technical defenses alone are insufficient. A resilient security posture results from embedding security awareness, responsibility, and proactive behavior into every organizational layer. This…
-
Die Bösen kooperieren, die Guten streiten sich
by
in SecurityNews
Tags: ciso, compliance, cyber, cyberattack, cyersecurity, finance, group, microsoft, resilience, sap, strategy, usaEine Koalition einflussreicher CISOs sieht den G7-Gipfel 2025 als ideale Gelegenheit, die G7- und OECD-Mitgliedsstaaten zu einer stärkeren Zusammenarbeit und Harmonisierung der Cybersicherheitsvorschriften zu bewegen.Da Cyberangriffe immer weiter zunehmen und internationale Banden vermehrt miteinander kooperieren, bedarf es einer stärkeren, grenzüberschreitenden Zusammenarbeit der ‘Guten”. Das zumindest behaupten Führungskräfte namhafter Unternehmen wie Salesforce, Microsoft, AWS, Mastercard, SAP…
-
Commvault warns of critical Command Center flaw
by
in SecurityNews
Tags: access, authentication, ciso, cvss, data, exploit, flaw, infrastructure, network, ransomware, vulnerabilityPre-authentication increases exploitability: Heath Renfrow, CISO and co-founder at FEnix24, told CSO that the vulnerability is both “technically serious” and “operationally significant” for organizations, for a number of reasons.For starters, it enables pre-authentication exploitation, meaning that it can be triggered before any authentication is required, leading to high exploitability without the need for credentials. Additionally, the…
-
Critical Commvault SSRF could allow attackers to execute code remotely
by
in SecurityNews
Tags: access, authentication, ciso, cvss, data, exploit, flaw, infrastructure, network, ransomware, vulnerabilityPre-authentication increases exploitability: Heath Renfrow, CISO and co-founder at FEnix24, told CSO that the vulnerability is both “technically serious” and “operationally significant” for organizations, for a number of reasons.For starters, it enables pre-authentication exploitation, meaning that it can be triggered before any authentication is required, leading to high exploitability without the need for credentials. Additionally, the…
-
Lesson from huge Blue Shield California data breach: Read the manual
by
in SecurityNewsread the documentation of any third party service you sign up for, to understand the security and privacy controls;know what data is being collected from your organization, and what you don’t want shared.”It’s important to understand these giant platforms make it easy for you to share your data across their various services,” he said. “So…
-
CISOs band together to urge world governments to harmonize cyber rules
by
in SecurityNewsPolicymakers have moved slowly to reduce regulatory overlap, but the new industry plea could help change that. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/cisos-governments-harmonize-cyber-rules/746275/
-
10 key questions security leaders must ask at RSA 2025
by
in SecurityNews
Tags: access, ai, api, application-security, authentication, automation, business, cisa, ciso, cloud, conference, control, corporate, cve, cyber, cybersecurity, data, defense, detection, edr, endpoint, fido, finance, gartner, google, government, healthcare, infrastructure, microsoft, mitigation, mitre, monitoring, mssp, network, nist, passkey, password, phone, programming, resilience, risk, risk-management, service, software, strategy, switch, threat, tool, training, vulnerability, zero-trustIs agentic AI more myth than reality?: Building on 2024’s AI enthusiasm, this year will be all about agentic AI, defined as “a type of AI that enables software systems to act autonomously, making decisions and taking actions based on goals, with minimal human intervention,” according to AI itself (source: Google Gemini). We’ll see lots…
-
Erodiert die Security-Reputation der USA?
by
in SecurityNews
Tags: business, ceo, china, cisa, ciso, cybersecurity, cyersecurity, endpoint, exploit, germany, governance, government, intelligence, iran, kaspersky, north-korea, service, strategy, threat, usaTrump stiftet Verunsicherung auch wenn’s um Cybersicherheit geht.Nachdem US-Präsident Donald Trump nun auch Cybersicherheitsunternehmen per Executive Order für abweichende politische Positionen abstraft, befürchten nicht wenige Branchenexperten, dass US-Sicherheitsunternehmen künftig ähnlich in Verruf geraten könnten wie ihre russischen und chinesischen Konkurrenten. Die zentralen Fragen sind dabei:Können sich CISOs beziehungsweise ihre Unternehmen künftig noch auf US-amerikanische Bedrohungsinformationen…
-
Cybersecurity Snapshot: NIST Aligns Its Privacy and Cyber Frameworks, While Researchers Warn About Hallucination Risks from GenAI Code Generators
by
in SecurityNews
Tags: access, advisory, ai, attack, breach, china, cisa, cisco, ciso, cloud, computer, control, csf, cve, cyber, cyberattack, cybersecurity, data, defense, encryption, espionage, exploit, firmware, framework, governance, government, group, hacker, hacking, healthcare, identity, infrastructure, Internet, LLM, malicious, mfa, mitigation, mitre, network, nist, open-source, password, phishing, privacy, risk, risk-assessment, router, service, software, strategy, supply-chain, technology, threat, tool, update, vulnerabilityCheck out NIST’s effort to further mesh its privacy and cyber frameworks. Plus, learn why code-writing GenAI tools can put developers at risk of package-confusion attacks. Also, find out what Tenable webinar attendees said about identity security. And get the latest on the MITRE CVE program and on attacks against edge routers. Dive into five…
-
Building a Security First Culture Advice from Industry CISOs
by
in SecurityNewsIn today’s threat landscape, cybersecurity is no longer confined to firewalls and encryption it’s a cultural imperative. Chief Information Security Officers (CISOs) play a pivotal role in transforming organizations into security-first environments where every employee, from interns to executives, actively safeguards digital assets. This shift requires moving beyond compliance checklists to foster shared accountability, continuous…