Tag: ciso
-
From Cloud Native to AI Native: Lessons for the Modern CISO to Win the Cybersecurity Arms Race
By adopting AI Native security operations, organizations gain a formidable defense posture and streamline their use of human talent for the most challenging, creative and impactful tasks First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/03/from-cloud-native-to-ai-native-lessons-for-the-modern-ciso-to-win-the-cybersecurity-arms-race/
-
How CISOs are approaching staffing diversity with DEI initiatives under pressure
Staffing diversity can help avoid homogenous thinking: Similarly, Sam McMahon, senior manager of IT and security at Valimail, underscores the necessity of representing different backgrounds and mindsets.”In my experience, even small security teams benefit greatly from the variety of perspectives that come with different backgrounds and skill sets,” he says. “We know that the majority…
-
How healthcare CISOs can balance security and accessibility without compromising care
In this Help Net Security interview, Sunil Seshadri, EVP and CSO at HealthEquity, talks about the growing risks to healthcare data and what organizations can do to stay ahead. … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/03/20/sunil-seshadri-healthequity-healthcare-data-risk/
-
5 pitfalls that can delay cyber incident response and recovery
The responsibility of cyber incident response falls squarely on the shoulders of the CISO. And many CISOs invest heavily in technical response procedures, tabletop exercises … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/03/20/incident-response-pitfalls/
-
That breach cost HOW MUCH? How CISOs can talk effectively about a cyber incident’s toll
Tags: attack, breach, business, ciso, cyber, cybersecurity, data, email, incident, incident response, insurance, jobs, network, phone, ransomware, risk, risk-managementThe importance of practice in estimating costs: Quantifying the costs of an incident in advance is an inexact art greatly aided by tabletop exercises. “The best way in my mind to flush all of this out is by going through a regular incident response tabletop exercise,” Gary Brickhouse, CISO at GuidePoint Security, tells CSO. “People…
-
Moving beyond checkbox security for true resilience
In this Help Net Security interview, William Booth, director, ATTCK Evaluations at MITRE, discusses how CISOs can integrate regulatory compliance with proactive risk … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/03/19/william-booth-mitre-proactive-security-measures/
-
Breaking Down Risks in Cybersecurity
Cyber Crime Junkies podcast Breaking Down Risks in Cybersecurity A great conversation on the Cyber Crime Junkies podcast with David Mauro! We covered so many different topics that the CISOs are struggling with: Generative vs Agentic AI risks and opportunities How cyber attackers leverage powerful tools like…
-
Why States Will Need to Step Up Cyber Help for Healthcare
As uncertainty mounts about the range of cyber resources the federal government will continue to offer healthcare and other critical infrastructure sectors during the Trump administration, states will need to step up their support, said Mike Hamilton, field CISO of cybersecurity firm Lumifi Cyber. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/interviews/states-will-need-to-step-up-cyber-help-for-healthcare-i-5467
-
Not all cuts are equal: Security budget choices disproportionately impact risk
Tags: ai, application-security, attack, awareness, backdoor, breach, bug-bounty, business, ceo, ciso, cloud, compliance, container, control, cyber, cybersecurity, data, iam, identity, incident response, infrastructure, monitoring, phishing, risk, risk-management, service, software, strategy, technology, threat, tool, training, update, usa, vulnerability[Source: Splunk] As cyber threats evolve at an unprecedented pace, delaying essential technology upgrades can severely impact an organization. The newest technological updates are introduced to enhance an organization’s security offerings and directly address recently identified challenges.”Outdated systems lack new features and functionality that allow for more sophisticated offerings, like moving to the cloud,” Kirsty…
-
How financial institutions can minimize their attack surface
In this Help Net Security interview, Sunil Mallik, CISO of Discover Financial Services, discusses cybersecurity threats for financial institutions. He also shares insights on … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/03/18/sunil-mallik-discover-financial-institutions-security/
-
What Is Exposure Management and Why Does It Matter?
Tags: access, attack, breach, business, ciso, cloud, compliance, credentials, cve, cyber, cybersecurity, data, data-breach, group, identity, infrastructure, iot, metric, password, phishing, risk, service, software, technology, threat, tool, vulnerability, vulnerability-managementEach Monday, the Tenable Exposure Management Academy will provide the practical, real-world guidance you need to shift from vulnerability management to exposure management. In our first blog in this new series, we get you started with an overview of the differences between the two and explore how cyber exposure management can benefit your organization. Traditional…
-
AI development pipeline attacks expand CISOs’ software supply chain risk
Tags: access, ai, api, application-security, attack, backdoor, breach, business, ciso, cloud, container, control, cyber, cybersecurity, data, data-breach, detection, encryption, exploit, flaw, fortinet, government, infrastructure, injection, intelligence, LLM, malicious, malware, ml, network, open-source, password, penetration-testing, programming, pypi, risk, risk-assessment, russia, saas, sbom, service, software, supply-chain, threat, tool, training, vpn, vulnerabilitydevelopment pipelines are exacerbating software supply chain security problems.Incidents of exposed development secrets via publicly accessible, open-source packages rose 12% last year compared to 2023, according to ReversingLabs (RL).A scan of 30 of the most popular open-source packages found an average of six critical-severity and 33 high-severity flaws per package.Commercial software packages are also a…
-
Tel Aviv Stock Exchange CISO: Making Better Use of Your SIEM
If rule writing for SIEMs isn’t managed properly, it can lead to false positives and misconfigurations, which create extra work for the SOC team. First seen on darkreading.com Jump to article: www.darkreading.com/cyber-risk/tel-aviv-stock-exchange-ciso-making-better-use-of-your-siem
-
7 misconceptions about the CISO role
Tags: api, attack, breach, business, ceo, ciso, compliance, control, corporate, cyber, cyberattack, cybersecurity, defense, exploit, finance, firewall, governance, infrastructure, insurance, jobs, network, password, phishing, resilience, risk, risk-assessment, risk-management, saas, software, startup, strategy, technology, threat, tool, training, update, vulnerabilityKatie Jenkins, EVP and CISO, Liberty Mutual Insurance Liberty Mutual InsuranceThe field is changing so rapidly, Jenkins adds, she needs to commit time to keeping up on research and connecting with other CISOs for knowledge exchange.In addition to securing infrastructure, an effective CISO focuses on securing the business, experts say. This requires understanding how security…
-
Report on ransomware attacks on Fortinet firewalls also reveals possible defenses
Tags: access, attack, authentication, automation, backdoor, backup, ciso, control, credentials, cve, cybercrime, data, data-breach, defense, exploit, firewall, fortinet, group, infrastructure, Internet, lockbit, malicious, monitoring, network, password, radius, ransom, ransomware, risk, router, tactics, threat, tool, update, vpn, vulnerability, windowsSigns of intrusion: “This actor exhibits a distinct operational signature that blends elements of opportunistic attacks with ties to the LockBit ecosystem,” Forescout said in its analysis.”Mora_001’s relationship to the broader Lockbit’s ransomware operations underscores the increased complexity of the modern ransomware landscape where specialized teams collaborate to leverage complementary capabilities.”CISOs should note these consistent…
-
Workplace Chaos and Uncertainty Stoke Insider Risk Warnings
Expect Malicious Insiders to Pose ‘Big Challenge’ This Year for CISOs, Expert Warns. The current tumultuous environment for employees and job-seekers across business and government – with numerous layoffs, economic concerns and political chaos – is increasing the risk posed by trusted insiders, making for a big challenge for CISOs this year, says Forrester’s Allie…
-
Quantifying cyber risk strategies to resonate with CFOs and boards
In this Help Net Security interview, Mir Kashifuddin, Data Risk Privacy Leader at PwC, discusses how CISOs can translate cyber risk into business value and secure a … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/03/14/mir-kashifuddin-pwc-business-cyber-risk/
-
Cybersecurity in Kommunen: Eigeninitiative gefragt
Tags: awareness, best-practice, ciso, cyber, cybersecurity, cyersecurity, DSGVO, germany, resilienceDeutsche Kommunen erscheinen in Sachen Cybersicherheit eine leichte Beute zu sein.Das cyberintelligence.institute hat in Zusammenarbeit mit dem Cybersicherheitsunternehmen NordPass in einer Studie die kommunale Cybersicherheit in Deutschland aus juristischer und organisatorischer Sicht analysiert. Demnach befinden sich Städte und Gemeinden in einer Zwickmühle.Auf der einen Seite sind die Kommunen der Studie zufolge ein interessantes Ziel. Locken…
-
Live Ransomware Demo: See How Hackers Breach Networks and Demand a Ransom
Cyber threats evolve daily. In this live webinar, learn exactly how ransomware attacks unfold”, from the initial breach to the moment hackers demand payment.Join Joseph Carson, Delinea’s Chief Security Scientist and Advisory CISO, who brings 25 years of enterprise security expertise. Through a live demonstration, he will break down every technical step of a ransomware…
-
Boards Challenged to Embrace Cybersecurity Oversight
Integrating Cyber Risk into Business Risk Decisions Cybersecurity failures are now business risks that CEOs and Boards must own. The world of business owners, investors, and their representatives are collectively realizing the potentially catastrophic impacts of cybersecurity incidents if not incorporated into the strategic management of the most senior business leadership. Many regulatory bodies, insurance…
-
Fast 1 Million Geschäfts- und Privat-PCs kompromittiert
Tags: ciso, control, cyersecurity, github, mail, malware, microsoft, powershell, ransomware, softwareEin Bericht von Microsoft zeigt, wie wichtig es für CISOs ist, das Sicherheitsbewusstsein ihrer Mitarbeiter zu schulen.Malware ist und bleibt ein massives Problem, welches CISOs zunehmend Kopfzerbrechen bereitet. Insbesondere wenn Mitarbeitende durch unvorsichtiges Online-Surfen ihre Geräte und ganze IT-Netzwerke mit Schadsoftware infizieren. Sind Systeme kompromittiert, kann das schwerwiegende Konsequenzen wie Ransomware-Attacken nach sich ziehen. Zu…
-
CIOs and CISOs take on NIS2: Key challenges, security opportunities
Tags: access, cio, ciso, compliance, cybersecurity, data, GDPR, group, healthcare, ISO-27001, jobs, monitoring, nis-2, office, organized, privacy, regulation, risk, skills, software, strategy, supply-chain, technology, trainingCompliance will be easier for some: There are CIOs and CISOs who have found NIS2 compliance relatively easy: those who have worked toward ISO/IEC 27001:2022 certification, whether they remained in the preparation phase or actually got certified.Those who have the certification report having found themselves with “80% of the work done”: the company is ready…
-
Top 5 threats keeping CISOs up at night in 2025
Cyber threats in 2025 require a proactive, adaptive approach. To stay ahead, CISOs must balance technical defenses, regulatory expectations, and human factors. By prioritizing … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/03/14/top-threats-ciso-2025/
-
KI-gestützte Angriffe machen deutschen Betrieben zu schaffen
Während Hacker KI bereits flächendeckend für ihre Angriffe missbrauchen, tun sich die Verteidiger noch schwer mit dem KI-Einsatz.Viele deutsche Unternehmen identifizieren KI-basierte Cyberangriffe zwar als große Gefahr, hinken bei ihrer Vorbereitung auf den neuen Angriffsvektor allerdings noch hinterher. Das ist ein Kernergebnis des “State of AI Cybersecurity”-Berichts von Darktrace. Demzufolge spürten fast 70 Prozent der…
-
Australian financial firm hit with lawsuit after massive data breach
Tags: access, awareness, breach, ciso, cyber, cybersecurity, data, data-breach, finance, firewall, infrastructure, malware, monitoring, network, resilience, risk, risk-management, software, threat, training, updateproperly configuring and monitoring firewalls to protect against cyber-attacksupdating and patching software and operating systems consistently and in a timely mannerproviding regular, mandatory cybersecurity awareness training to staffallocating inadequate human, technological, and financial resources to manage cybersecurity.As a result of those failures, ASIC said in its court filing, “A FIIG employee inadvertently downloaded a .zip…
-
Hiring privacy experts is tough, here’s why
Tags: ai, business, ciso, compliance, cybersecurity, data, framework, jobs, privacy, resilience, skills, technology, trainingWhy it is difficult to hire privacy experts: Finding a highly skilled privacy professional can feel like chasing a unicorn, Kazi describes. “Yes, privacy is important, but they want somebody who’s a lawyer, an expert in technology, knowledgeable about user interface and user experience, and ideally, they know a lot about ethics and are an…
-
CISOs, are your medical devices secure? Attackers are watching closely
The adoption of connected medical devices, collectively called the Internet of Medical Things (IoMT), has transformed patient care. However, this technological advancement has … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/03/13/secure-medical-devices/

