Tag: ciso
-
Gigamon-Umfrage unter CISOs – Metadaten sind die Eckpfeiler der Sicherheitsstrategien für 2026
Tags: cisoFirst seen on security-insider.de Jump to article: www.security-insider.de/ki-cybersicherheit-cisos-herausforderungen-a-0f62b5baf2e0c43132120d6ae4d85d3b/
-
A CISO’s Perspective on Scaling GenAI Securely
Going Beyond the Copilot Pilot – A CISO’s Perspective. With 60% of businesses piloting M365 Copilot but only 6% scaling, this webinar explores why gen AI deployments stall, and what CISOs and IT leaders must know to roll out secure, compliant, and effective AI productivity tools. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/cisos-perspective-on-scaling-genai-securely-a-30141
-
Heineken CISO champions a new risk mindset to unlock innovation
In this Help Net Security interview, Marina Marceta, CISO at Heineken, discusses what it takes for CISOs to be seen as business-aligned leaders rather than technical … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/11/26/marina-marceta-heineken-business-aligned-security/
-
How board members think about cyber risk and what CISOs should tell them
In this Help Net Security video, Jonathan Trull, EVP CISO at Qualys, discusses which cybersecurity metrics matter most to a board of directors. Drawing on more than two … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/11/26/cybersecurity-metrics-for-boards-video/
-
How board members think about cyber risk and what CISOs should tell them
In this Help Net Security video, Jonathan Trull, EVP CISO at Qualys, discusses which cybersecurity metrics matter most to a board of directors. Drawing on more than two … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/11/26/cybersecurity-metrics-for-boards-video/
-
Agentic AI die besten Security-Anwendungsfälle
Tags: access, ai, authentication, breach, ceo, ciso, cyber, cyberattack, cybersecurity, cyersecurity, defense, detection, fraud, identity, network, office, phishing, risk, scam, service, soc, strategy, threat, vulnerability, zero-trustKI-Agenten können Security-Profis den Arbeitsalltag deutlich erleichtern. Lesen Sie, wie. Agentic-AI-Systeme führen Aufgaben selbständig und ohne manuelle Eingriffe aus. Dieses Grundprinzip dürfte nicht wenige CISOs und Sicherheitsexperten erst einmal eher abschrecken. Allerdings entdecken immer mehr Security-Experten, dass Agentic AI wesentlich weniger komplex und schwierig zu implementieren ist, als angenommen und Cybersecurity-Prozesse in besonderem Maße bereichern…
-
Find the Invisible: Salt MCP Finder Technology for Proactive MCP Discovery
The conversation about AI security has shifted. For the past year, the focus has been on the model itself: poisoning data, prompt injection, and protecting intellectual property. These are critical concerns, but they miss the bigger picture of how AI is actually being operationalized in the enterprise. We are entering the era of Agentic AI.…
-
7 signs your cybersecurity framework needs rebuilding
Tags: ai, awareness, best-practice, breach, business, ceo, ciso, cloud, compliance, cyberattack, cybersecurity, data, detection, endpoint, finance, firmware, framework, Hardware, healthcare, incident response, mobile, network, nist, privacy, risk, risk-management, service, software, strategy, supply-chain, threat, tool, training2. Experiencing a successful cyberattack, of any size: Nothing highlights a weak cybersecurity framework better than a breach, says Steven Bucher, CSO at Mastercard. “I’ve seen firsthand how even a minor incident can reveal outdated protocols or gaps in employee training,” he states. “If your framework hasn’t kept pace with evolving threats or business needs,…
-
Sweet Security Raises $75M for Unified AI and Cloud Defense
Israeli Startup Plans to Integrate AI Agent Guardrails Into Cloud Platform. Sweet Security secured $75 million in Series B funding to integrate AI security into its CNAPP platform. With runtime protection as its differentiator, the startup plans to address growing CISO concerns over shadow AI and attack vectors involving intelligent agents. First seen on govinfosecurity.com…
-
Sweet Security Raises $75M for Unified AI and Cloud Defense
Israeli Startup Plans to Integrate AI Agent Guardrails Into Cloud Platform. Sweet Security secured $75 million in Series B funding to integrate AI security into its CNAPP platform. With runtime protection as its differentiator, the startup plans to address growing CISO concerns over shadow AI and attack vectors involving intelligent agents. First seen on govinfosecurity.com…
-
CISOs Get Real About Hiring in the Age of AI
Dark Reading Confidential Episode 12: Experts help cyber job seekers get noticed, make an argument for a need to return to the hacker ethos of a bygone era, and have a stark conversation about keeping AI from breaking the sector’s talent pipeline for years to come. First seen on darkreading.com Jump to article: www.darkreading.com/cybersecurity-operations/ciscos-get-real-about-hiring-age-ai
-
Ex-CISA officials, CISOs dispel ‘hacklore,’ spread cybersecurity truths
Don’t believe everything you read First seen on theregister.com Jump to article: www.theregister.com/2025/11/24/hacklore_launch/
-
Ex-CISA officials, CISOs dispel ‘hacklore,’ spread cybersecurity truths
Don’t believe everything you read First seen on theregister.com Jump to article: www.theregister.com/2025/11/24/hacklore_launch/
-
2026 CSO Hall of Fame call for nominations
Tags: ceo, cio, ciso, corporate, cybersecurity, finance, google, group, infrastructure, international, jobs, risk, risk-management, sans, technology2025 CSO Hall of Fame Honorees Meg Anderson, VP & CISO (retired), Principal Financial Group Bob Bruns, CISO, Avanade Jonathan Chow, CISO, Genesys Mignona Cote, CISO, Infor Laura Deaner, Managing Director, CISO, The Depository Trust & Clearing Corporation (DTCC) George Finney, CISO, University of Texas System Michael Gordon, SVP & CISO, McDonald’s Ron Green, Cybersecurity Fellow/Former CSO, Mastercard Shawn Henry, CSO, CrowdStrike Todd Lukens,…
-
2026 CSO Hall of Fame call for nominations
Tags: ceo, cio, ciso, corporate, cybersecurity, finance, google, group, infrastructure, international, jobs, risk, risk-management, sans, technology2025 CSO Hall of Fame Honorees Meg Anderson, VP & CISO (retired), Principal Financial Group Bob Bruns, CISO, Avanade Jonathan Chow, CISO, Genesys Mignona Cote, CISO, Infor Laura Deaner, Managing Director, CISO, The Depository Trust & Clearing Corporation (DTCC) George Finney, CISO, University of Texas System Michael Gordon, SVP & CISO, McDonald’s Ron Green, Cybersecurity Fellow/Former CSO, Mastercard Shawn Henry, CSO, CrowdStrike Todd Lukens,…
-
What keeps CISOs awake at night, and why Zurich might hold the cure
Tags: access, ai, api, attack, breach, ciso, conference, control, cve, cyber, cybersecurity, deep-fake, detection, endpoint, exploit, finance, firmware, framework, group, incident response, injection, LLM, malware, mandiant, microsoft, mitre, network, phishing, phone, ransomware, resilience, risk, soc, strategy, supply-chain, threat, tool, training, update, zero-dayA safe space in the Alps: Over two days at Zurich’s stunning Dolder Grand, hosted by the Swiss Cyber Institute, I witnessed something I’ve seldom seen at cybersecurity events: real vulnerability. In a closed, attribution-free environment, leaders shared not just strategies, but doubts. And that made this event stand out, not as another conference, but…
-
What keeps CISOs awake at night, and why Zurich might hold the cure
Tags: access, ai, api, attack, breach, ciso, conference, control, cve, cyber, cybersecurity, deep-fake, detection, endpoint, exploit, finance, firmware, framework, group, incident response, injection, LLM, malware, mandiant, microsoft, mitre, network, phishing, phone, ransomware, resilience, risk, soc, strategy, supply-chain, threat, tool, training, update, zero-dayA safe space in the Alps: Over two days at Zurich’s stunning Dolder Grand, hosted by the Swiss Cyber Institute, I witnessed something I’ve seldom seen at cybersecurity events: real vulnerability. In a closed, attribution-free environment, leaders shared not just strategies, but doubts. And that made this event stand out, not as another conference, but…
-
The CISO’s greatest risk? Department leaders quitting
What CISOs can and should be doing: The situation isn’t hopeless; there are steps CISOs can and should take to help avoid defections. It’s a matter of making staff a priority. PayNearMe’s Hobson says CISOs need to ask themselves whether functional security leaders are wearing too many hats with too few opportunities to advance, and…
-
Email blind spots are back to bite security teams
The threat landscape is forcing CISOs to rethink what they consider normal. The latest Cybersecurity Report 2026 by Hornetsecurity, based on analysis of more than 70 billion … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/11/24/hornetsecurity-email-attack-tactics-report/
-
SEC Ends SolarWinds Suit After Major Legal Setbacks
High-Profile Case Ends After Judge Guts SEC’s Cyber Fraud Allegations. The SEC has dropped its remaining claims against SolarWinds and CISO Tim Brown, ending a controversial cyber fraud lawsuit that aimed to expand securities law to cover operational security failures tied to the 2020 Russian hacking campaign. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/sec-ends-solarwinds-suit-after-major-legal-setbacks-a-30101
-
SEC Dismisses Remains of Lawsuit Against SolarWinds and Its CISO
The SEC dismissed the remain charges in the lawsuit filed in 2023 against software maker SolarWinds and CISO Timothy Brown in the wake of the massive Sunburst supply chain attack, in which a Russian nation-state group installed a malicious update into SolarWInds software that then compromised the systems of some customers. First seen on securityboulevard.com…
-
SEC Dismisses Remains of Lawsuit Against SolarWinds and Its CISO
The SEC dismissed the remain charges in the lawsuit filed in 2023 against software maker SolarWinds and CISO Timothy Brown in the wake of the massive Sunburst supply chain attack, in which a Russian nation-state group installed a malicious update into SolarWInds software that then compromised the systems of some customers. First seen on securityboulevard.com…
-
SOCs Must Be Built for Speed in the AI Threat Era
KPMG’s John Israel on Speed, Autonomy and Trusted AI in Security. The adversarial use of AI has dramatically compressed attack timelines, forcing organizations to rethink their security operations centers. John Israel, global CISO at KPMG, discusses how companies must reshape their SOC programs around speed, increased automation and governance. First seen on govinfosecurity.com Jump to…
-
Root causes of security breaches remain elusive, jeopardizing resilience
Tags: attack, breach, business, ciso, cyber, cybercrime, cybersecurity, data, detection, framework, governance, incident response, intelligence, lessons-learned, monitoring, resilience, security-incident, service, siem, skills, software, strategy, tactics, technology, threat, tool, training, update, vpn, vulnerabilityTracing an attack path: Preparation is key, so businesses need to have dedicated tools and skills for digital forensics in place before an incident occurs through technologies such as security incident and event management (SIEM).SIEM devices are important because, for example, many gateway and VPN devices have a local storage that overwrites itself within hours.”If…
-
Research shows identity document checks are missing key signals
Most CISOs spend their time thinking about account takeover and phishing, but identity document fraud is becoming a tougher challenge. A new systematic review shows how … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/11/21/identity-document-fraud-detection-research/
-
SEC Drops SolarWinds Case After Years of High-Stakes Cybersecurity Scrutiny
The U.S. Securities and Exchange Commission (SEC) has abandoned its lawsuit against SolarWinds and its chief information security officer, alleging that the company had misled investors about the security practices that led to the 2020 supply chain attack.In a joint motion filed November 20, 2025, the SEC, along with SolarWinds and its CISO Timothy G.…
-
SEC Drops SolarWinds Case After Years of High-Stakes Cybersecurity Scrutiny
The U.S. Securities and Exchange Commission (SEC) has abandoned its lawsuit against SolarWinds and its chief information security officer, alleging that the company had misled investors about the security practices that led to the 2020 supply chain attack.In a joint motion filed November 20, 2025, the SEC, along with SolarWinds and its CISO Timothy G.…
-
Sysdig Whitepaper: Warum eine AIBOM die Blaupause für sichere KI-Modelle ist
Das neue Whitepaper ‘AIBOM: The infrastructure, risks, and how to secure AI models” steht ab sofort kostenlos auf der Sysdig-Website bereit. Es richtet sich an Sicherheits- und Entwicklungsteams, CISOs, Compliance-Beauftragte sowie alle Organisationen, die KI sicher und verantwortungsvoll einsetzen möchten. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/sysdig-whitepaper-warum-eine-aibom-die-blaupause-fuer-sichere-ki-modelle-ist/a42923/
-
Cybersecurity Snapshot: Global Agencies Target Criminal “Bulletproof” Hosts, as CSA Unveils Agentic AI Risk Framework
Tags: access, advisory, ai, android, apple, attack, banking, breach, browser, chrome, cisa, ciso, cloud, compliance, control, credentials, credit-card, crypto, cve, cyber, cybercrime, cybersecurity, data, defense, detection, endpoint, extortion, finance, firewall, firmware, flaw, framework, google, governance, government, group, guide, Hardware, ibm, identity, infection, infrastructure, international, Internet, law, linux, malicious, malware, microsoft, mobile, monitoring, network, open-source, oracle, password, phishing, radius, ransomware, rat, resilience, risk, risk-assessment, risk-management, russia, scam, service, software, switch, technology, threat, tool, update, vulnerability, windowsCyber agencies call on ISPs to help combat “bulletproof” internet hosts that shield cybercriminals. Meanwhile, the CSA introduced a new methodology to assess the risks of autonomous AI. Plus, get the latest on the CIS Benchmarks, drone-detection systems, and malware infections. Key takeaways Crackdown on “bulletproof” hosting: International cyber agencies are urging ISPs and network…

