Tag: ciso
-
How to Prepare for EU AI Act Compliance by February 2nd
As the February 2nd deadline approaches, CISOs and CCOs face the pressing task of aligning their organizations with the EU AI Act’s stringent requirements. Chapter 1, Article 4 mandates AI literacy for all staff involved in AI operations, while Chapter 2, Article 5 prohibits certain practices that could infringe on fundamental rights. This article explores……
-
Crisis Simulations: A Top 2025 Concern for CISOs
CISOs are planning to adjust their budgets this year to reflect their growing concerns for cybersecurity preparedness in the event of a cyberattack. First seen on darkreading.com Jump to article: www.darkreading.com/endpoint-security/crisis-simulations-2025-concern-cisos
-
CISOs Are Gaining C-Suite Swagger, but Has It Come With a Cost?
The number of CISOs who report directly to the CEO is up sharply in recent years, but many still say it’s not enough to secure adequate resources. First seen on darkreading.com Jump to article: www.darkreading.com/threat-intelligence/cisos-gaining-c-suite-swagger
-
CISOs Boost Crisis Simulation Budgets Amid High-Profile Cyber-Attacks
74% of CISOs plan to increase their cyber crisis simulation budgets in 2025 First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/ciso-boost-crisis-simulation/
-
CISOs’ top 12 cybersecurity priorities for 2025
Tags: access, ai, api, attack, authentication, automation, awareness, business, cio, ciso, cloud, compliance, control, corporate, cybersecurity, data, detection, framework, governance, identity, incident response, infrastructure, intelligence, jobs, mitigation, monitoring, mssp, oracle, penetration-testing, privacy, risk, risk-management, service, strategy, technology, threat, training, usa, zero-trustSecurity chief Andrew Obadiaru’s to-do list for the upcoming year will be familiar to CISOs everywhere: advance a zero-trust architecture in the organization; strengthen identity and access controls as part of that drive; increase monitoring of third-party risks; and expand the use of artificial intelligence in security operations.”Nothing is particularly new, maybe AI is newer,…
-
Cybersecurity needs women, and it needs to treat them better
Tags: cio, ciso, computer, cyber, cyberattack, cybersecurity, data-breach, group, healthcare, jobs, service, skills, technology, trainingThe participation of women in cybersecurity is vital, a non-negotiable proposition. Forget any current handwringing over diversity and equity; it’s fundamental that the contribution of women to the profession has made cybersecurity better.The proverbial door was kicked open long ago for women, who have made major contributions to the development of information security. But it’s…
-
The Security Risk of Rampant Shadow AI
While employees want to take advantage of the increased efficiency of GenAI and LLMs, CISOs and IT teams must be diligent and stay on top of the most up-to-date security regulations. First seen on darkreading.com Jump to article: www.darkreading.com/vulnerabilities-threats/security-risk-rampant-shadow-ai
-
CISOs stehen unter Druck – Compliance fordert ihren Tribut von IT-Sicherheitsverantwortlichen
First seen on security-insider.de Jump to article: www.security-insider.de/cybersecurity-kommunikation-zwischen-abteilung-vorstand-a-5cff9c51254f348f7b97bf2104bb3940/
-
CISOs Dramatically Increase Boardroom Influence but Still Lack Soft Skills
Splunk reveals that 82% of CISOs now report directly to the CEO, but many lack EQ First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/cisos-increase-boardroom-influence/
-
CISOs are juggling security, responsibility, and burnout
This article gathers excerpts from multiple reports, presenting statistics and insights that may be valuable for CISOs, helping them with informed decision-making, risk … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/01/23/ciso-statistics-insights/
-
Is Your Automation Exposing Critical Data?
Is Automation Compromising Your Data Security? In modern business environments, how secure is your automation process? Alarmingly, many companies are unknowingly exposing critical data due to inadequate Non-Human Identity (NHI) and Secrets Management practices. This emerging field is crucial to maintaining data integrity and has become a high-priority concern for many CISOs, IT professionals, and……
-
Mastercard’s multi-year DNS cut-and-paste nightmare
Due to a Domain Name System (DNS) setting error, which the security researcher who discovered it said was almost certainly a cut-and-paste problem, Mastercard had a DNS record with a missing character for almost five years. That error would have allowed attackers to potentially take over the subdomain, create a bogus site that mimics the…
-
Rethinking Credential Security
Whether you’re a CISO or a security professional this Q&A is packed with credential security insights you can implement today. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/01/rethinking-credential-security/
-
2024 Most Inspiring Women in Cyber Winners: Where Are They Now?
Over the past five years, The Most Inspiring Women in Cyber Awards have celebrated some of the most exceptional women from across the cybersecurity industry. From new starters and students to CEOs and CISOs, the awards aim to celebrate outstanding individuals at every level of the industry. No deed is too small for recognition and…
-
Cybersecurity is tough: 4 steps leaders can take now to reduce team burnout
Tags: ai, attack, breach, business, ciso, compliance, control, corporate, cybercrime, cybersecurity, group, incident response, international, jobs, risk, soc, tactics, threatWorking in cybersecurity is only getting harder. Cybercriminals continue to up their game as security teams scramble to catch up with attack tactics and techniques. Organizations put near-impossible demands on their security departments, often with little or no support.The “always-on” nature of many roles in cybersecurity (from SOC analyst to incident response to the CISO)…
-
Security chiefs whose companies operate in the EU should be exploring DORA now
Tags: attack, business, ciso, compliance, conference, corporate, cyber, cybersecurity, data, detection, dora, finance, framework, GDPR, incident, network, regulation, resilience, risk, service, technology, threat, vulnerabilityIf your enterprise operates in Europe, you should care about the Digital Operational Resilience Act (DORA), which took effect on January 17. DORA, also known as Directive (EU) 2022/2555 of the European Parliament, aims to enhance and build the EU’s cybersecurity capabilities and it has been hanging like the Sword of Damocles over the heads…
-
Acronis CISO on why backup strategies fail and how to make them resilient
In this Help Net Security interview, Gerald Beuchelt, CISO at Acronis, discusses common backup strategy pitfalls, reasons for backup failures, and offers actionable advice for … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/01/22/gerald-beuchelt-acronis-backup-strategy/
-
CISO Top 10 Priorities for Q1 2025: Key Findings and Evolving Focus
Tags: cisoFirst seen on scworld.com Jump to article: www.scworld.com/perspective/ciso-top-10-priorities-for-q1-2025-key-findings-and-evolving-focus
-
Why CISOs Must Think Clearly Amid Regulatory Chaos
Tags: cisoEven as the rule book changes, the profession of the CISO remains unchanged: protecting the organization in a world of constant, continually evolving threats. First seen on darkreading.com Jump to article: www.darkreading.com/cybersecurity-operations/cisos-must-think-clearly-amid-regulatory-chaos
-
7 top cybersecurity projects for 2025
Tags: access, advisory, ai, backup, best-practice, breach, business, cio, ciso, cloud, compliance, control, cyber, cybersecurity, data, data-breach, detection, encryption, framework, google, governance, infrastructure, intelligence, law, mitigation, monitoring, network, resilience, risk, risk-management, service, strategy, technology, threat, tool, vulnerabilityAs 2025 dawns, CISOs face the grim reality that the battle against cyberattackers never ends. Strong and carefully planned cybersecurity projects are the best way to stay a step ahead of attackers and prevent them gaining the upper hand.”Urgency is the mantra for 2025,” says Greg Sullivan, founding partner of cybersecurity services firm CIOSO Global.…
-
Wie sich Cybersecurity mit KI im Jahr 2025 weiterentwickelt
Kürzlich veröffentlichte Google Cloud seinen Cybersecurity Forecast für das Jahr 2025 [1]. Der Bericht enthält zukunftsweisende Erkenntnisse mehrerer führender Sicherheitsverantwortlicher von Google Cloud darunter Google Threat Intelligence, Mandiant Consulting und das Office of the CISO von Google Cloud. Sie beschreiben unter anderem, wie die nächste Phase der künstlichen Intelligenz (KI) sowohl für Angreifer als… First…
-
Check Point veröffentlicht Security-Report 2025
Check Point Software Technologies hat seinen jährlichen Bericht ‘The State of Global Cyber Security 2025″ veröffentlicht. Angesichts eines alarmierenden Anstiegs der weltweiten Cyber-Angriffe um 44 Prozent im Vergleich zum Vorjahr enthüllt der Bericht neue Cyber-Trends, neue Taktiken von Hackern und gibt CISOs Anleitungen an die Hand, um unbeschadet durch das Jahr zu kommen. ‘Bei der Cybersicherheit…
-
How organizations can secure their AI code
Tags: ai, application-security, awareness, backdoor, breach, business, chatgpt, ciso, compliance, control, credentials, crime, cybersecurity, data, data-breach, finance, github, healthcare, LLM, malicious, ml, open-source, organized, programming, risk, risk-management, software, startup, strategy, supply-chain, technology, tool, training, vulnerabilityIn 2023, the team at data extraction startup Reworkd was under tight deadlines. Investors pressured them to monetize the platform, and they needed to migrate everything from Next.js to Python/FastAPI. To speed things up, the team decided to turn to ChatGPT to do some of the work. The AI-generated code appeared to function, so they…
-
Midsize firms universally behind in slog toward DORA compliance
Tags: ai, business, ciso, compliance, cybersecurity, dora, finance, germany, insurance, intelligence, monitoring, resilience, risk, service, skills, technology, toolBeginning Friday, Jan. 17, all EU financial institutions are now required to operate in compliance with the Digital Operational Resilience Act (DORA). The EU directive aims to increase cybersecurity in the financial industry. However, studies show that many companies are still struggling with implementation.According to a November 2024 survey from metafinanz, the average level of…
-
US hits back against China’s Salt Typhoon group
Tags: attack, backdoor, china, cisa, ciso, communications, computer, control, crypto, cve, cyber, cyberattack, cybersecurity, defense, detection, disinformation, espionage, exploit, finance, government, group, infosec, infrastructure, intelligence, ivanti, law, malicious, mandiant, microsoft, network, north-korea, office, tactics, technology, theft, threat, tool, vpn, vulnerabilityThe US is hitting back against the threat group, dubbed Salt Typhoon by Microsoft, which is allegedly behind recent cyber attacks against American telecommunications providers, as part of a wider campaign against Chinese-based hacking.On Friday the Department of the Treasury’s Office of Foreign Assets Control (OFAC) said it is sanctioning Sichuan Juxinhe Network Technology, a…
-
Back to the Basics For 2025: Securing Your Business
Gary Perkins, CISO at CISO Global Cybersecurity may seem complex, but it boils down to consistent implementation of best practices. Disabling unnecessary services, securing cloud configurations, enforcing MFA, training employees, and adopting a proactive security mindset are crucial steps to safeguarding your business. In 2025, prioritize these basics to significantly reduce your exposure to threats……
-
Cloud 3.0 Is Here: What CISOs Must Do Now
CSA’s Jim Reavis on Why Generative AI Requires a Shift in Data Security Strategy. Over the past two years, AI enabled by a cloud interface has ushered in the age of cloud 3.0. The industry is evolving faster than anyone could predict, forcing organizations to rethink their security and risk strategies, said Jim Reavis, CEO…

