Tag: ciso
-
10 promising cybersecurity startups CISOs should know about
Tags: access, ai, attack, automation, business, ceo, ciso, cloud, compliance, container, control, cybersecurity, data, deep-fake, defense, detection, endpoint, exploit, finance, gartner, google, governance, government, grc, ibm, identity, linux, malicious, microsoft, military, monitoring, network, open-source, ransomware, RedTeam, risk, saas, software, startup, supply-chain, technology, threat, tool, vulnerability, vulnerability-management, zero-trust2. Chainguard: Category: Software supply chain securityWhy they’re here: Founded in 2021 by Dan Lorenc (formerly at Microsoft and Google), Chainguard offers a Linux-based platform for securely building applications. The company has raised more than $600M and is valued at $3.5B. In fiscal year 2025, Chainguard reached a $40M annual run rate and by the…
-
10 promising cybersecurity startups CISOs should know about
Tags: access, ai, attack, automation, business, ceo, ciso, cloud, compliance, container, control, cybersecurity, data, deep-fake, defense, detection, endpoint, exploit, finance, gartner, google, governance, government, grc, ibm, identity, linux, malicious, microsoft, military, monitoring, network, open-source, ransomware, RedTeam, risk, saas, software, startup, supply-chain, technology, threat, tool, vulnerability, vulnerability-management, zero-trust2. Chainguard: Category: Software supply chain securityWhy they’re here: Founded in 2021 by Dan Lorenc (formerly at Microsoft and Google), Chainguard offers a Linux-based platform for securely building applications. The company has raised more than $600M and is valued at $3.5B. In fiscal year 2025, Chainguard reached a $40M annual run rate and by the…
-
10 promising cybersecurity startups CISOs should know about
Tags: access, ai, attack, automation, business, ceo, ciso, cloud, compliance, container, control, cybersecurity, data, deep-fake, defense, detection, endpoint, exploit, finance, gartner, google, governance, government, grc, ibm, identity, linux, malicious, microsoft, military, monitoring, network, open-source, ransomware, RedTeam, risk, saas, software, startup, supply-chain, technology, threat, tool, vulnerability, vulnerability-management, zero-trust2. Chainguard: Category: Software supply chain securityWhy they’re here: Founded in 2021 by Dan Lorenc (formerly at Microsoft and Google), Chainguard offers a Linux-based platform for securely building applications. The company has raised more than $600M and is valued at $3.5B. In fiscal year 2025, Chainguard reached a $40M annual run rate and by the…
-
Gen AI success requires an AI champions network
How to ensure network success: Only by having direct access to the core AI program team will your AI champions be able to escalate blockers, share wins, or ask questions. What they surface will include everything from permissions problems to policy gray zones to unplanned usage patterns that could be scaled into formal solutions. That…
-
Gen AI success requires an AI champions network
How to ensure network success: Only by having direct access to the core AI program team will your AI champions be able to escalate blockers, share wins, or ask questions. What they surface will include everything from permissions problems to policy gray zones to unplanned usage patterns that could be scaled into formal solutions. That…
-
Gen AI success requires an AI champions network
How to ensure network success: Only by having direct access to the core AI program team will your AI champions be able to escalate blockers, share wins, or ask questions. What they surface will include everything from permissions problems to policy gray zones to unplanned usage patterns that could be scaled into formal solutions. That…
-
Rhysida ransomware exploits Microsoft certificate to slip malware past defenses
Identifying forensic signals: The campaigns that leverage trusted certificates undermine the trust model enterprises rely on. Signed malware bypasses app-allow lists, browser warnings, OS checks, and antivirus assumptions about signed code. When the file poses as Teams or PuTTY, employees don’t hesitate to download it as it looks normal.”Once inside, the malware runs with fewer…
-
Rhysida ransomware exploits Microsoft certificate to slip malware past defenses
Identifying forensic signals: The campaigns that leverage trusted certificates undermine the trust model enterprises rely on. Signed malware bypasses app-allow lists, browser warnings, OS checks, and antivirus assumptions about signed code. When the file poses as Teams or PuTTY, employees don’t hesitate to download it as it looks normal.”Once inside, the malware runs with fewer…
-
Rhysida ransomware exploits Microsoft certificate to slip malware past defenses
Identifying forensic signals: The campaigns that leverage trusted certificates undermine the trust model enterprises rely on. Signed malware bypasses app-allow lists, browser warnings, OS checks, and antivirus assumptions about signed code. When the file poses as Teams or PuTTY, employees don’t hesitate to download it as it looks normal.”Once inside, the malware runs with fewer…
-
What does aligning security to the business really mean?
Indicators of alignment: One barometer of security-business alignment in action, Thielemann says, is when security teams engage with the business and use business metrics to determine security’s effectiveness.As an example, she points to the partnership between security and engineering at a manufacturing plant that had devices using software no longer supported by the vendor. The…
-
What does aligning security to the business really mean?
Indicators of alignment: One barometer of security-business alignment in action, Thielemann says, is when security teams engage with the business and use business metrics to determine security’s effectiveness.As an example, she points to the partnership between security and engineering at a manufacturing plant that had devices using software no longer supported by the vendor. The…
-
What does aligning security to the business really mean?
Indicators of alignment: One barometer of security-business alignment in action, Thielemann says, is when security teams engage with the business and use business metrics to determine security’s effectiveness.As an example, she points to the partnership between security and engineering at a manufacturing plant that had devices using software no longer supported by the vendor. The…
-
Securing real-time payments without slowing them down
Tags: cisoIn this Help Net Security interview, Arun Singh, CISO at Tyro, discusses what it takes to secure real-time payments without slowing them down. He explains how analytics, … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/11/03/arun-singh-tyro-securing-real-time-payments/
-
Securing real-time payments without slowing them down
Tags: cisoIn this Help Net Security interview, Arun Singh, CISO at Tyro, discusses what it takes to secure real-time payments without slowing them down. He explains how analytics, … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/11/03/arun-singh-tyro-securing-real-time-payments/
-
Securing real-time payments without slowing them down
Tags: cisoIn this Help Net Security interview, Arun Singh, CISO at Tyro, discusses what it takes to secure real-time payments without slowing them down. He explains how analytics, … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/11/03/arun-singh-tyro-securing-real-time-payments/
-
Searchlight Cyber Buys Intangic to Help Quantify Cyber Risk
European Startup Acquisition Aims to Unify Technical and Financial Cyber Insights. The acquisition of Intangic enhances Searchlight Cyber’s ability to quantify and price cyber risk by leveraging AI and dark web intelligence. The combined platform will offer actionable third-party risk data for CISOs, CFOs and insurance providers to better understand and manage cyber exposure. First…
-
Bug-Bounty-Programm trifft KI ein zweischneidiges Schwert
Tags: ai, api, bug-bounty, ciso, cloud, compliance, hacker, reverse-engineering, service, threat, tool, vulnerabilityKI-gestütztes Bug Hunting verspricht viele Vorteile. Ob sich diese auch in der Praxis verwirklichen, ist eine andere Sache.Künstliche Intelligenz (KI) wird zunehmend auch zum Treiber von Bug-Bounty-Programmen. Sicherheitsexperten greifen auf Large Language Models (LLMs) zurück, um:die Suche nach Schwachstellen zu automatisieren,Reverse Engineering von APIs zu bewerkstelligen, undCode-Basen schneller denn je zu durchleuchten.Allerdings gehen diese Effizienz-…
-
Bug-Bounty-Programm trifft KI ein zweischneidiges Schwert
Tags: ai, api, bug-bounty, ciso, cloud, compliance, hacker, reverse-engineering, service, threat, tool, vulnerabilityKI-gestütztes Bug Hunting verspricht viele Vorteile. Ob sich diese auch in der Praxis verwirklichen, ist eine andere Sache.Künstliche Intelligenz (KI) wird zunehmend auch zum Treiber von Bug-Bounty-Programmen. Sicherheitsexperten greifen auf Large Language Models (LLMs) zurück, um:die Suche nach Schwachstellen zu automatisieren,Reverse Engineering von APIs zu bewerkstelligen, undCode-Basen schneller denn je zu durchleuchten.Allerdings gehen diese Effizienz-…
-
Bug-Bounty-Programm trifft KI ein zweischneidiges Schwert
Tags: ai, api, bug-bounty, ciso, cloud, compliance, hacker, reverse-engineering, service, threat, tool, vulnerabilityKI-gestütztes Bug Hunting verspricht viele Vorteile. Ob sich diese auch in der Praxis verwirklichen, ist eine andere Sache.Künstliche Intelligenz (KI) wird zunehmend auch zum Treiber von Bug-Bounty-Programmen. Sicherheitsexperten greifen auf Large Language Models (LLMs) zurück, um:die Suche nach Schwachstellen zu automatisieren,Reverse Engineering von APIs zu bewerkstelligen, undCode-Basen schneller denn je zu durchleuchten.Allerdings gehen diese Effizienz-…
-
The unified linkage model: A new lens for understanding cyber risk
Tags: access, api, attack, breach, ciso, cloud, compliance, credentials, cve, cyber, cybersecurity, data, defense, exploit, flaw, framework, identity, incident response, infrastructure, intelligence, malicious, mitre, network, nist, okta, open-source, radius, resilience, risk, risk-analysis, saas, sbom, software, supply-chain, threat, update, vpn, vulnerability, zero-day, zero-trustMissed systemic risk: Organizations secure individual components but miss how vulnerabilities propagate through dependencies (e.g., Log4j embedded in third-party apps).Ineffective prioritization: Without a linkage structure, teams patch high-severity CVEs on isolated systems while leaving lower-scored flaws on critical trust pathways.Slow incident response: When a zero-day emerges, teams scramble to locate vulnerable components. Without pre-existing linkage…
-
AI-powered bug hunting shakes up bounty industry, for better or worse
Tags: access, ai, authentication, automation, bug-bounty, business, ciso, cloud, control, credentials, data, detection, exploit, flaw, guide, identity, infrastructure, injection, intelligence, risk, risk-management, sql, strategy, supply-chain, threat, tool, vulnerabilityFirehose of ‘false positives’: Gunter Ollmann, CTO at Cobalt.io, warns that AI is exacerbating the existing problem that comes from vendors getting swamped with often low-quality bug submissions.Security researchers turning to AI is creating a “firehose of noise, false positives, and duplicates,” according to Ollmann.”The future of security testing isn’t about managing a crowd of…
-
AI-powered bug hunting shakes up bounty industry, for better or worse
Tags: access, ai, authentication, automation, bug-bounty, business, ciso, cloud, control, credentials, data, detection, exploit, flaw, guide, identity, infrastructure, injection, intelligence, risk, risk-management, sql, strategy, supply-chain, threat, tool, vulnerabilityFirehose of ‘false positives’: Gunter Ollmann, CTO at Cobalt.io, warns that AI is exacerbating the existing problem that comes from vendors getting swamped with often low-quality bug submissions.Security researchers turning to AI is creating a “firehose of noise, false positives, and duplicates,” according to Ollmann.”The future of security testing isn’t about managing a crowd of…
-
You can’t audit how AI thinks, but you can audit what it does
In this Help Net Security interview, Wade Bicknell, Head, IT Security Operations, CFA Institute, discusses how CISOs can use AI while maintaining security and … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/10/31/wade-bicknell-cfa-institute-ciso-ai-security-governance/
-
Building Cyber Resilience Across Canada’s Skies
NAV Canada CISO Tom Bornais on Keeping IT and OT Systems Running. With threats targeting aviation infrastructure, NAV Canada CISO Tom Bornais explained how his team focuses on building resilience rather than chasing perfection. He outlined why internal alignment, incident simulation and supply chain security are critical to defending IT and OT systems. First seen…
-
The secret to audit success? Think like your auditor
Tags: cisoIn this Help Net Security video, Doug Kersten, CISO at Appfire, shares practical, experience-driven advice on how CISOs can avoid the most common mistakes when preparing for … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/10/31/ciso-audit-preparation-video/
-
Strengthening security with a converged security and networking platform
created new security risks. Products are designed with different fundamental security assumptions. Each has a separate security policy and requires a specially trained administrator, making it difficult to coordinate security policies and use products together. The result is a fragmented security infrastructure with inconsistent rules and poor visibility. Conflicting policies and uneven enforcement create the…
-
Strengthening security with a converged security and networking platform
created new security risks. Products are designed with different fundamental security assumptions. Each has a separate security policy and requires a specially trained administrator, making it difficult to coordinate security policies and use products together. The result is a fragmented security infrastructure with inconsistent rules and poor visibility. Conflicting policies and uneven enforcement create the…
-
Human-Centered Leadership Strengthens OT Security
OTsec Canada Chairman on Balancing Wellness, Collaboration and Compliance. Organizations defending critical infrastructure must shift from compliance-focused strategies to holistic resilience. Ahead of the OTsec Canada Summit, Énergir CISO Martin Laberge outlines why people-first leadership and national coordination are essential for OT security resilience. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/human-centered-leadership-strengthens-ot-security-a-29886

