Tag: ciso
-
How One Leaked Credential Can Expose a Threat Actor
The Power of One: From Leaked Credential to Campaign Attribution Attribution has always been the elusive prize in threat intelligence. The question every CISO wants answered after an attack: “Who did this?” Historically, attribution required heavy resources, deep visibility, and sometimes even luck. But in today’s world of digital risk intelligence, one leaked credential can……
-
Entwicklerteams sind immer stärker für die Anwendungssicherheit verantwortlich
Checkmarx hat seine jährliche Studie ‘A CISO’s Guide to Steering AppSec in the Age of DevSecOps” vorgestellt. Aufsetzend auf eine Umfrage unter 200 Chief Information Security Officers (CISOs) aus verschiedenen Branchen und Regionen weltweit identifiziert die Studie zentrale Faktoren, die den Trend zu einer engeren Zusammenarbeit zwischen Entwickler- und Sicherheitsteams vorantreiben. Die wichtigste Erkenntnis ist,…
-
Cyber Defenders Save the Country of Berylia – Once Again!
CISO Joe Carson on How NATO’s Locked Shields Sharpens Defenders for the Next Attack. Each year, the tiny northern Atlantic Ocean island country of Berylia comes under a massive cyberattack. It’s all part of one of the world’s largest red team-blue team exercises called Locked Shields, which has attracted thousands of cyber professionals including Joe…
-
Southwest Airlines CISO on tackling cyber risks in the aviation industry
In this Help Net Security interview, Carrie Mills, VP and CISO, Southwest Airlines talks about the cybersecurity challenges facing the aviation industry. She explains how … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/05/14/carrie-mills-southwest-airlines-aviation-industry-cybersecurity-challenges/
-
4 critical leadership priorities for CISOs in the AI era
1. Guide the C-suite As businesses rush to implement AI effectively, CISOs can play an important role in guiding the C-suite on a variety of matters, starting with vetting AI use cases, Alexander says. “These are conversations with technologists, security, and the business. You can’t just jump into the AI game without really understanding what…
-
Nachfolge unklar – Microsoft macht Ann Johnson zum CISO für Europa vorübergehend
First seen on security-insider.de Jump to article: www.security-insider.de/microsoft-stellvertretender-ciso-europa-cybersicherheit-a-4b4795bfa7ec8369cad1fa1992452eab/
-
CISA’s alert pivot reflects a new era of decentralized cyber threat communication
Tags: access, cisa, ciso, communications, cyber, cybersecurity, email, exploit, incident response, intelligence, kev, monitoring, risk, strategy, threat, tool, update, vulnerabilityFrom centralized alerts to multi-channel intelligence: CISA’s shift means enterprises must now adopt a more proactive approach to gathering threat intelligence. While the agency isn’t reducing the volume of information shared, the distribution model now demands a more decentralized, digitally savvy strategy from recipients.This change empowers organizations to refine how they consume alerts, Varkey said.…
-
CISO Survey Surfaces Shift in Application Security Responsibilities
A global survey of 200 CISOs suggests responsibility for application security is shifting more toward the teams building and deploying software. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/05/ciso-survey-surfaces-shift-in-application-security-responsibilities/
-
IAM 2025: Diese 10 Trends entscheiden über Ihre Sicherheitsstrategie
Tags: access, ai, api, authentication, best-practice, cio, ciso, cloud, compliance, conference, credentials, crypto, cryptography, detection, dora, framework, governance, iam, identity, iot, kritis, login, mfa, nis-2, resilience, risk, risk-analysis, service, strategy, threat, tool, zero-trustDie Kernaussage der EIC Conference 2025: IAM ist ein ganzheitlicher Architekturansatz und kein Toolset. Identity & Access Management (IAM) ist nicht länger eine Frage der Tool-Auswahl, sondern der Architektur. Diese Kernaussage prägte die European Identity and Cloud Conference 2025, die vom 6. bis 9. Mai in Berlin stattfand. Mit über 1.500 Teilnehmern, 300 Rednern und…
-
Author’s QA: It’s high time for CISOs to start leading strategically, or risk being scapegoated
The cybersecurity landscape has never moved faster, and the people tasked with defending it have never felt more exposed. Related: How real people are really using GenAI Today’s Chief Information Security Officers (CISOs) operate in a pressure cooker: responsible… (more”¦) First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/05/authors-qa-its-high-time-for-cisos-to-start-leading-strategically-or-risk-being-scapegoated/
-
CIO des Jahres 2025 jetzt mitmachen und bis Ende Mai bewerben
So sehen Siegerinnen und Sieger aus. Die Gewinnerinnen und Gewinner des vergangenen Jahres jubeln über ihre CIO-des-Jahres-Awards. Machen auch Sie mit und bewerben Sie sich dann stehen Sie vielleicht im Oktober 2025 auf der großen Gala-Bühne und dürfen sich über die renommierteste IT-Auszeichnung Deutschlands freuen. cio.de / Tobias TschepeDie heiße Phase für die Bewerbung um…
-
CISOs must speak business to earn executive trust
In this Help Net Security interview, Pritesh Parekh, VP, CISO at PagerDuty talks about how CISOs can change perceptions of their role, build influence across the organization, … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/05/13/pritesh-parekh-pagerduty-cisos-business-leaders-conversations/
-
Deepfake attacks are inevitable. CISOs can’t prepare soon enough.
Tags: advisory, ai, attack, authentication, awareness, blockchain, business, ciso, compliance, control, cybersecurity, data, deep-fake, defense, detection, espionage, finance, fraud, governance, grc, identity, incident response, jobs, law, mfa, north-korea, password, privacy, resilience, risk, scam, software, strategy, tactics, technology, threat, tool, training, updateReal-world fabrications: Even security vendors have been victimized. Last year, the governance risk and compliance (GRC) lead at cybersecurity company Exabeam was hiring for an analyst, and human resources (HR) qualified a candidate that looked very good on paper with a few minor concerns, says Kevin Kirkwood, CISO.”There were gaps in how the education represented…
-
73% of CISOs admit security incidents due to unknown or unmanaged assets
Business continuity (42% of respondents)Competitiveness (39%)Customer trust and brand reputation (39%)Supplier relationships (39%)Employee productivity (38%)Financial performance (38%)Despite the obvious dangers, the survey shows that enterprises are doing too little. Forty-three percent of companies employ special tools for proactive risk management of their attack surface. The majority (58%) admitted they have not implemented processes for continuous…
-
The rise of vCISO as a viable cybersecurity career path
Tags: advisory, business, ceo, cio, ciso, compliance, computer, control, country, cyber, cybersecurity, government, grc, group, guide, healthcare, incident response, infrastructure, ISO-27001, jobs, mobile, network, nist, risk, risk-assessment, risk-management, service, skills, strategy, technology, tool, trainingDamon Petraglia, vCISO and CISO on demand Blue Mantis Damon Petraglia A long-time cybersecurity pro with chops built up in the federal government world and through forensic investigation work, Damon Petraglia works as a vCISO and CISO on demand for the IT services firm Blue Mantis.”Where I am today as a vCISO is a culmination…
-
KI-Herausforderungen für CISOs und ihre Teams 2025 Mit KI gegen KI
CISOs müssen die neuen Cyberbedrohungen durch KI frühzeitig erkennen. Gleichzeitig müssen sie KI-basierte Lösungen einsetzen, um ihnen einen Schritt voraus zu sein. First seen on ap-verlag.de Jump to article: ap-verlag.de/ki-herausforderungen-fuer-cisos-und-ihre-teams-2025-mit-ki-gegen-ki/95654/
-
Why CISOs Must Prioritize Cybersecurity Culture in Remote Work
In the era of remote and hybrid work, Chief Information Security Officers (CISOs) are now tasked with cultivating a strong cybersecurity culture in remote work, extending far beyond traditional responsibilities like managing firewalls and monitoring networks. The shift to distributed teams has dissolved the traditional office perimeter, exposing organizations to new vulnerabilities and threats. Employees…
-
How to rationalize IDPs (without painful migrations)
For enterprise CIOs, CISOs, and IT leaders, managing multiple identity providers (IDPs) is a costly, complex, and security-intensive challenge. Whether due to M&A activities, multi-cloud strategies, or regulatory requirements, fragmented identity ecosystems drive up expenses, increase security risks, and hinder operational efficiency. Why organizations run multiple identity providers Large enterprises often run multiple Identity Providers……
-
Building IDP Resilience
In today’s digital economy, identity is more than just an authentication checkpoint”, it’s the backbone of user access, security, and continuity. And as CISOs and IAM architects work to modernize their identity systems, one imperative has moved from the sidelines to center stage: IDP resilience. When identity becomes a single point of failure Most enterprises…
-
Bringing Zero Trust Into the AI Era
University of Texas CISO George Finney on Zero Trust Challenges and His New Book. Enterprises need to mature their zero trust models to recognize how trust is inherently built into artificial intelligence and how to proactively identify vulnerabilities. George Finney, CISO at University of Texas Systems, says security teams need to be trained to spot…
-
RSA Conference 2025: How Agentic AI Is Redefining Trust, Identity, and Access at Scale
RSAC 2025 revealed that AI agents are reshaping trust and identity. Learn what top CISOs are doing about it and how the conversation about NHI governance is evolving. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/05/rsa-conference-2025-how-agentic-ai-is-redefining-trust-identity-and-access-at-scale/
-
‘CISOs sprechen heute die Sprache des Business”
Nick Godfrey, Leiter des Office of the CISO bei Google Cloud Google CloudAls Senior Director und Leiter des Office of the CISO bei Google Cloud ist es die Aufgabe von Nick Godfrey, das Unternehmen beim Austausch zwischen CISOs rund um die Themen Cloud und Security zu unterstützen. Godfrey, selbst ehemaliger Sicherheitsverantwortlicher bei einem Finanzdienstleister, leitet…
-
Microsoft OneDrive move may facilitate accidental sensitive file exfiltration
want to make syncing easier, as it can create lots of security and IT headaches.The rollout was originally scheduled for this weekend (May 11), but sometime late on Thursday, the Microsoft page about the feature was changed to say that it was being pushed out in June. Microsoft did not immediately explain the delay, but discussions…
-
AI in Zero Trust: Hype, Hope and Hidden Gaps
CISOs Seek Real Value as Vendors Tout the Latest Batch of AI-Driven Solutions. As the conversation shifts from generative to agentic AI, it’s clear that AI holds tremendous potential to ease zero trust fatigue, but only when guided by business context, quality data and human oversight. CISOs see AI as a basket of opportunities but…
-
CrowdStrike cuts 500 jobs in AI pivot, but flags risks
A CISO’s new mandate As security vendors trim traditional roles and lean more heavily on AI, will support, integration, and incident response suffer? Ali warned CISOs to “review vendor roadmaps for signs of over-prioritizing AI.”She cautioned that replacing essential human expertise, such as threat researchers or customer success teams, with automated systems like large language…
-
India-Pakistan conflict underscores your C-suite’s need to prepare for war
Tags: business, ciso, communications, conference, cyber, cyberattack, data-breach, disinformation, government, india, infrastructure, military, network, russia, service, supply-chain, ukraine, update, usa, vulnerabilityHow the India-Pakistan conflict raises the stakes: Should the conflict between these two nuclear powers escalate and become a full-blown war, the disruption to supply chains, research and development, and support services has the potential to be significant. Pakistan’s technical hubs in Karachi, Lahore, and Islamabad will be placed in jeopardy. India’s technical hubs in…
-
Why Identity Signals Are Replacing IOCs in Threat Intelligence
The CISO’s View: Too Many Alerts, Too Little Context Imagine a SOC analyst under pressure. Their screen is filled with IP addresses, malware hashes, geolocations, login alerts, and thousands of other signals. It’s a flood of noise. IOCs used to be the gold standard for cyber threat detection, but today? Attackers don’t need malware or……
-
Quantum supremacy: Cybersecurity’s ultimate arms race has China way in front
Tags: ai, authentication, automation, backup, banking, breach, business, china, ciso, computing, control, crypto, cryptography, cybersecurity, data, encryption, finance, government, healthcare, identity, infrastructure, jobs, military, ml, nist, risk, service, skills, technology, threat, update, vulnerability, zero-dayThe DeepSeek/Qwen factor: What we learned from recent AI advances, such as DeepSeek and Qwen, that caught the world by surprise is that China’s technology is much more advanced than anyone anticipated. I’d argue that this is a leading indicator that China’s quantum computing capabilities are also in absolute stealth-mode development and ahead of the…

