Tag: ciso
-
The CISO’s guide to stronger board communication
In this Help Net Security video, Alisdair Faulkner, CEO of Darwinium, explores how the role of the CISO has changed over the past decade. Faulkner shares insights on how CISOs … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/09/29/ciso-board-communication-video/
-
The CISO’s guide to stronger board communication
In this Help Net Security video, Alisdair Faulkner, CEO of Darwinium, explores how the role of the CISO has changed over the past decade. Faulkner shares insights on how CISOs … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/09/29/ciso-board-communication-video/
-
Crash Tests for Security: Why BAS Is Proof of Defense, Not Assumptions
Car makers don’t trust blueprints. They smash prototypes into walls. Again and again. In controlled conditions.Because design specs don’t prove survival. Crash tests do. They separate theory from reality. Cybersecurity is no different. Dashboards overflow with “critical” exposure alerts. Compliance reports tick every box. But none of that proves what matters most to a CISO:The…
-
Resilienz als Prinzip Netzwerksicherheit für kommende Disruptionen
Widerstandsfähigkeit beginnt mit strategischem Fernzugriff. Verschiedene Störungen, wie Pandemien, geopolitische Krisen oder Naturkatastrophen, sind für Führungskräfte längst keine Ausnahmen mehr, sondern Teil der Realität. Entsprechend müssen sie planen. Für CISOs steht dabei eine zentrale Frage im Fokus: ‘Ist unsere Infrastruktur so gestaltet, dass sie auch unter schwierigen Bedingungen den sicheren Geschäftsbetrieb gewährleistet?” Zwei Ansätze dominieren…
-
Qantas cutting CEO pay signals new era of cyber accountability
Tags: ai, attack, breach, ceo, ciso, cyber, cybersecurity, data, data-breach, finance, governance, incident, incident response, malicious, privacy, ransomware, riskWhat should CISOs and CEOs do now?: CISOs, who have historically borne the brunt of breaches and malicious cyber incidents, should take heed of this emerging trend. “Be aware of the environment and expectations today, and where they’re headed,” Redgraves’ Tully says. “Try to get out in front of that. You need to work with…
-
CISO Spotlight: AJ Debole on the Business-Tech Divide, Breach Readiness, and AI Risks
Tags: ai, breach, business, ciso, corporate, cyber, defense, government, healthcare, law, oracle, ransomware, riskAJ Debole is Field CISO at Oracle, but her journey began far from the corporate boardroom. After starting out in law and government, she moved into healthcare and cyber defense, where she led teams through ransomware crises. In this spotlight, she explores the next wave of challenges aligning security with business incentives, taming AI […]…
-
Mit ShadowV2 wird DDoS zu einem Cloud-nativen Abo-Dienst
DDos-Attacken sind mittlerweile als Auftragsmodell verfügbar, wie eine aktuelle Analyse zeigt.Laut einer Darktrace-Analyse nutzt eine ShadowV2-Bot-Kampagne falsch konfigurierte Docker-Container auf AWS und rüstet sie für DDoS-as-a-Service-Angriffe auf.Was ShadowV2 dabei besonders macht, ist die professionelle Ausstattung mit APIs, Dashboards, Betreiber-Logins und sogar animierten Benutzeroberflächen. ‘Dies ist eine weitere Erinnerung daran, dass Cyberkriminalität kein Nebenjob mehr ist,…
-
AI coding assistants amplify deeper cybersecurity risks
Tags: access, ai, api, application-security, attack, authentication, business, ceo, ciso, cloud, compliance, control, cybersecurity, data, data-breach, detection, fintech, flaw, governance, injection, leak, LLM, metric, open-source, programming, radius, risk, risk-management, service, software, startup, strategy, threat, tool, training, vulnerability‘Shadow’ engineers and vibe coding compound risks: Ashwin Mithra, global head of information security at continuous software development firm Cloudbees, notes that part of the problem is that non-technical teams are using AI to build apps, scripts, and dashboards.”These shadow engineers don’t realize they’re part of the software development life cycle, and often bypass critical…
-
5 questions CISOs should ask vendors
2. Will it reduce my workload, add value or improve operations?: A common starting point is to ask questions about how a new tool will reduce workload, minimize risk, improve resilience or simplify operations.Basu wants to know whether the product can consolidate capabilities instead of adding yet another point solution. “Without that, each tool only…
-
5 questions CISOs should ask vendors
2. Will it reduce my workload, add value or improve operations?: A common starting point is to ask questions about how a new tool will reduce workload, minimize risk, improve resilience or simplify operations.Basu wants to know whether the product can consolidate capabilities instead of adding yet another point solution. “Without that, each tool only…
-
From FBI to CISO: Unconventional Paths to Cybersecurity Success
Cybersecurity leader Jason Manar shares insights on diverse career paths, essential skills, and practical advice for entering and thriving in the high-stress yet rewarding field of cybersecurity. First seen on darkreading.com Jump to article: www.darkreading.com/cybersecurity-operations/fbi-ciso-unconventional-paths-cybersecurity-success
-
Lean Teams, Higher Stakes: Why CISOs Must Rethink Incident Remediation
Big companies are getting smaller, and their CEOs want everyone to know it. Wells Fargo has cut its workforce by 23% over five years, Bank of America has shed 88,000 employees since 2010, and Verizon’s CEO recently boasted that headcount is “going down all the time.” What was once a sign of corporate distress has…
-
The CISO’s guide to rolling out generative AI at scale
Tags: access, ai, best-practice, chatgpt, ciso, communications, governance, guide, jobs, lessons-learned, network, privacy, risk, technology, tool, trainingSet the stage for success Before launch, host an organization-wide lunch and learn to introduce the platform, explain the rollout’s goals, and connect the initiative to real work. This is not a marketing event; it’s an operational alignment session. Bring the vendor in to walk through the platform, show what it does, and answer questions.…
-
The CISO’s guide to rolling out generative AI at scale
Tags: access, ai, best-practice, chatgpt, ciso, communications, governance, guide, jobs, lessons-learned, network, privacy, risk, technology, tool, trainingSet the stage for success Before launch, host an organization-wide lunch and learn to introduce the platform, explain the rollout’s goals, and connect the initiative to real work. This is not a marketing event; it’s an operational alignment session. Bring the vendor in to walk through the platform, show what it does, and answer questions.…
-
Anton’s Security Blog Quarterly Q3 2025
Tags: ai, automation, breach, ciso, cloud, cyber, defense, detection, edr, google, governance, guide, metric, office, RedTeam, risk, siem, soc, software, supply-chain, threat, vulnerability, vulnerability-management, zero-trustAmazingly, Medium has fixed the stats so my blog / podcast quarterly is back to life. As before, this covers both Anton on Security and my posts from Google Cloud blog, Google Cloud community blog, and our Cloud Security Podcast (subscribe on Spotify). Gemini for docs based on this blog Top 10 posts with the most…
-
Data Trust Takes Center Stage at Healthcare Security Summit
CISOs, Regulators and Innovators Unite in New York to Safeguard Healthcare’s Future. From discussions on health data explosion to the keynote on AI deployment, the Healthcare Security Summit: New York offered practical strategies to manage data risks, ensure continuity of patient care and prepare for a regulatory landscape that is rapidly reshaping cybersecurity priorities. First…
-
6 Ways CISOs Are Using AI to Prioritize Critical Vulnerabilities
Just like AI is transforming business operations, it’s revolutionizing how CISOs handle vulnerabilities. AI-powered vulnerability prioritization helps reduce alert noise, focus on high-risk issues, and automate remediation, enabling security teams to act faster, stay ahead of threats, and strengthen their organization’s overall security posture. The post 6 Ways CISOs Are Using AI to Prioritize Critical…
-
CSO Awards winners highlight security innovation and transformation
Tags: ai, attack, automation, awareness, best-practice, business, ciso, cloud, compliance, conference, control, cyber, cybersecurity, data, defense, detection, finance, flaw, framework, governance, group, guide, infrastructure, intelligence, login, malicious, metric, mitre, network, penetration-testing, phishing, privacy, programming, risk, risk-management, service, siem, skills, soc, software, technology, threat, tool, training, update, vulnerability, vulnerability-managementFSU tackles third-party risk with tighter vendor management program: Organization: Florida State UniversityProject: Third-Party Risk Management ProgramSecurity leader: Bill Hunkapiller, CISOOfficials at Florida State University wanted to ensure that data shared with outside entities was well protected. To achieve that, CISO Bill Hunkapiller and his team revamped its third-party risk management program so that the…
-
Agentic AI der neue Horror für Sicherheitsentscheider?
Tags: ai, antivirus, api, breach, ciso, compliance, cyberattack, cybersecurity, cyersecurity, detection, governance, law, mail, malware, monitoring, risk, service, supply-chain, tool, vulnerabilityKI ist mittlerweile in den meisten Unternehmen gesetzt. Im Trend liegen aktuell vor allem Systeme mit autonomen Fähigkeiten bei denen die potenziellen Sicherheitsrisiken besonders ausgeprägt sind.KI-Agenten werden im Unternehmensumfeld immer beliebter und zunehmend in Workflows und Prozesse integriert. Etwa in den Bereichen Softwareentwicklung, Kundenservice und -Support, Prozessautomatisierung oder Employee Experience. Für CISOs und ihre Teams…
-
When Business Moves Fast, Security Gets Left Behind in MA
Mergers and acquisitions (M&A) often unfold at breakneck speed, driven by business opportunity and shareholder expectations. But as Dave Lewis, global advisory CISO at 1Password, explains, cybersecurity risks are still too often left as an afterthought. Lewis points to a recent example involving Salesforce apps and SalesLoft, where an acquired company carried unresolved security issues..…
-
Cybersecurity in smart cities under scrutiny
Tags: 5G, attack, breach, ciso, control, cyber, cyberattack, cybersecurity, data, detection, governance, government, infrastructure, intelligence, international, iot, monitoring, network, service, strategy, technology, tool, vulnerability, zero-trustEnrique DomÃnguez, Accenture Accenture. En la imagen, Enrique DomÃnguez.Rosa DÃaz Moles, director of public sector at S2GRUPO, also highlights smart cities’ complexity and their resulting cybersecurity issues.The digital transformation of public services involves “an accelerated convergence between IT and OT systems, as well as the massive incorporation of connected IoT devices,” she explains, which gives rise…
-
Cybersecurity in smart cities under scrutiny
Tags: 5G, attack, breach, ciso, control, cyber, cyberattack, cybersecurity, data, detection, governance, government, infrastructure, intelligence, international, iot, monitoring, network, service, strategy, technology, tool, vulnerability, zero-trustEnrique DomÃnguez, Accenture Accenture. En la imagen, Enrique DomÃnguez.Rosa DÃaz Moles, director of public sector at S2GRUPO, also highlights smart cities’ complexity and their resulting cybersecurity issues.The digital transformation of public services involves “an accelerated convergence between IT and OT systems, as well as the massive incorporation of connected IoT devices,” she explains, which gives rise…
-
Voice of the CISO von Proofpoint – Wachsende Sorgen deutscher CISOs
Tags: cisoFirst seen on security-insider.de Jump to article: www.security-insider.de/cisos-zweifeln-an-cyberabwehr-menschliche-fehler-genai-einsatz-a-ac9f79f5e96b78251088475e5271eea1/
-
Cybersecurity in smart cities, under scrutiny
Tags: 5G, attack, breach, ciso, control, cyber, cyberattack, cybersecurity, data, detection, governance, government, infrastructure, intelligence, international, iot, monitoring, network, service, strategy, technology, tool, vulnerability, zero-trustEnrique DomÃnguez, Accenture Accenture. En la imagen, Enrique DomÃnguez.Rosa DÃaz Moles, director of public sector at S2GRUPO, also highlights smart cities’ complexity and their resulting cybersecurity issues.The digital transformation of public services involves “an accelerated convergence between IT and OT systems, as well as the massive incorporation of connected IoT devices,” she explains, which gives rise…
-
Agencies increasingly dive into AI for cyber defense, acting federal CISO says
Mike Duffy said feds are looking at ways to use it even more for cybersecurity. First seen on cyberscoop.com Jump to article: cyberscoop.com/federal-agencies-ai-cyber-defense-mike-duffy-ciso/
-
Meet ShadowLeak: ‘Impossible to detect’ data theft using AI
Tags: ai, attack, business, ciso, cybersecurity, data, data-breach, email, exploit, gartner, governance, injection, LLM, malicious, RedTeam, resilience, risk, sans, service, sql, supply-chain, technology, theft, tool, update, vulnerabilityWhat CSOs should do: To blunt this kind of attack, he said CSOs should:treat AI agents as privileged actors: apply the same governance used for a human with internal resource access;separate ‘read’ from ‘act’ scopes and service accounts, and where possible sanitize inputs before LLM (large language model) ingestion. Strip/neutralize hidden HTML, flatten to safe…
-
How Top CISOs Approach Exposure Management in the Context of Managing Cyber Risk
Tags: ai, attack, best-practice, business, ciso, control, cvss, cyber, cybersecurity, data, framework, group, intelligence, leak, metric, monitoring, risk, software, strategy, threat, update, vulnerability, vulnerability-managementWondering what your peers think of exposure management? New reports from the Exposure Management Leadership Council, a CISO working group sponsored by Tenable, offer insights. Key takeaways The CISOs who make up the Exposure Management Leadership Council see exposure management as a strategic and game-changing approach to unified proactive security. They believe exposure management can…
-
AI Threats Top Focus at London Financial Services Summit
CISOs, Regulators, Innovators Unite to Strengthen Resilience in Financial Services. The London Financial Services Summit tackled today’s most urgent issues, from AI-powered fraud and third-party risks to compliance mandate, equipping participants with insights to secure finance in an era of volatility and disruption. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/ai-threats-top-focus-at-london-financial-services-summit-a-29474
-
How CISOs Can Drive Effective AI Governance
AI’s growing role in enterprise environments has heightened the urgency for Chief Information Security Officers (CISOs) to drive effective AI governance. When it comes to any emerging technology, governance is hard but effective governance is even harder. The first instinct for most organizations is to respond with rigid policies. Write a policy document, circulate a…

