Tag: ciso
-
Schleudersitz CISO – Diese Fehltritte kosten CISOs häufig den Kopf
Tags: cisoFirst seen on security-insider.de Jump to article: www.security-insider.de/vermeidbare-fehler-risiken-eines-cisos-a-136006cf4081ecfd542fd66222825788/
-
Securing Windows 11 and Server 2025: What CISOs should know about the latest updates
Susan Bradley / CSOYou can prevent Recall use by turning off the saving of snapshots and also disabling Click to Do. Alternatively, if you want to enable the service, I recommend setting a list of applications that you want filtered as well as excluding a list of URLs.In addition, you can set policies for Copilot.…
-
Even $5M a year can’t keep top CISOs happy
Some are unhappy with budgets too: : Not all CISOs working at large enterprises are happy with their six-figure salaries. According to the survey, only 55% of respondents working for $20 billion-plus firms were satisfied with what they were being paid and that group was the least satisfied of all questioned with what they were…
-
Cybersecurity Teams Generate Average of $36M in Business Growth
A new EY report found that cybersecurity teams are a major vehicle for business growth, and CISOs should push for a seat at the top table First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/cybersecurity-teams-business-growth/
-
What CISOs can learn from the frontlines of fintech cybersecurity
At Span Cyber Security Arena, I sat down with Ria Shetty, Director, Cyber Security Resilience for Europe at Mastercard. Our conversation cut through the hype and … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/05/29/ria-shetty-mastercard-cybersecurity-innovation/
-
How CISOs can regain ground in the AI fraud war
Fraudsters are winning the AI arms race, first-party fraud is rising, and siloed systems are holding back defenses, according to DataVisor. Their 2025 Fraud AML … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/05/29/ciso-ai-fraud-war/
-
CISOs prioritize AI-driven automation to optimize cybersecurity spending
Cybersecurity leaders and consultants identified AI-driven automation and cost optimization as top organizational priorities, according to Wipro. 30% of respondents are … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/05/29/ai-automation-investing/
-
Agenten-KI: Die stille Revolution der Cyber-Sicherheit
Die nächste große Wende in der Informationssicherheit hat längst begonnen: KI verändert Geschäftsmodelle -prozesse grundlegend und stellt die Cyber-Sicherheit vor neue Herausforderungen. Denn wo Maschinen in Millisekunden reagieren, reichen klassische Kontrollmechanismen nicht mehr aus. Für CISOs und CIOs heißt das: Strategien, Prozesse und Kontrollfunktionen müssen neu gedacht werden besonders im Licht der aufkommenden Agenten-KI. First…
-
‘Secure email’: A losing battle CISOs must give up
End-to-end encryption remains elusive: Email continues to be the dominant electronic communication tool today because it is well understood, relatively easy to use, and relatively inexpensive. By and large, businesses have approved email for sending confidential information, and we often convince ourselves that it is secure, can be secured with third-party tools, or it’s “good…
-
Will AI agent-fueled attacks force CISOs to fast-track passwordless projects?
Tags: access, ai, api, attack, authentication, breach, business, ciso, cloud, credentials, cyber, cybersecurity, data, fido, finance, framework, google, Hardware, identity, login, metric, microsoft, okta, passkey, password, phishing, privacy, risk, risk-management, service, technology, threat, tool, update, zero-trustPasswordless options: In retiring passwords, security leaders will need to consider their options, passkeys, biometrics, and third-party login services, looking for the best technical, usability, and security fit. There are pros and cons for each option, and in many cases CISOs may be guided towards one based on their existing environment.Passkeys, used by Microsoft, Samsung,…
-
Why data provenance must anchor every CISO’s AI governance strategy
Across the enterprise, artificial intelligence has crept into core functions not through massive digital transformation programs, but through quiet, incremental … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/05/28/cisos-ai-governance-strategy/
-
79% Regret Their Security Stack. Here’s Why Veriti Customers Don’t.
Gartner says 79% of technology buyers regret their last purchase1. That number isn’t just high it’s damning. This isn’t about UI preferences or feature gaps; it’s about trust lost, budgets wasted, and CISOs left holding the bag when outcomes don’t match expectations. The question is: why? The answer? Most tools stop at visibility. They flag… First…
-
CISO’s Guide To Web Privacy Validation And Why It’s Important
Are your web privacy controls protecting your users, or just a box-ticking exercise? This CISO’s guide provides a practical roadmap for continuous web privacy validation that’s aligned with real-world practices. Download the full guide here.Web Privacy: From Legal Requirement to Business EssentialAs regulators ramp up enforcement and users grow more privacy-aware, CISOs face a mounting…
-
How Hunters International Used the Browser to Breach Enterprises”Š”, “ŠAnd Why They Didn’t See It”¦
How Hunters International Used the Browser to Breach Enterprises”Š”, “ŠAnd Why They Didn’t See It Coming At RSAC 2025, Cato Networks delivered a presentation that SOC teams and CISOs will want to pay attention to: “Suspicious Minds”Š”, “ŠHunting Threats That Don’t Trigger Security Alerts.” The session showcased ransomware campaigns that bypassed traditional detection. In some cases,…
-
A handy list of risk questions every healthcare CISO should ask potential suppliers
First seen on scworld.com Jump to article: www.scworld.com/perspective/a-handy-list-of-risk-questions-every-healthcare-ciso-should-ask-potential-suppliers
-
Gigamon HybridStudie 2025 – Fast alle CISOs gehen in Sachen Sicherheit verheerende Kompromisse ein
First seen on security-insider.de Jump to article: www.security-insider.de/cisos-herausforderung-hybrid-cloud-sicherheit-a-6cbc11245415c0bf356100c35de88119/
-
A handy list of risk questions every healthcare CISO should ask potential suppliers
First seen on scworld.com Jump to article: www.scworld.com/perspective/a-handy-list-of-risk-questions-every-healthcare-ciso-should-ask-potential-suppliers
-
Agentic-AI und die Zukunft der Cybersecurity
Die technologische Entwicklung im Bereich der künstlichen Intelligenz (KI) hat in den letzten Jahren ein beispielloses Tempo erreicht. Diese Dynamik verändert nicht nur Geschäftsmodelle und Prozesse, sondern stellt auch die Cybersicherheit vor völlig neue Herausforderungen. Für CISOs, CIOs und andere Entscheidungsträger bedeutet dies: Strategien, Prozesse und Kontrollmechanismen müssen neu bewertet und konsequent weiterentwickelt werden, insbesondere…
-
Schluss mit schlechter Software
Tags: cisa, ciso, cyber, cyberattack, infrastructure, nis-2, resilience, risk, software, update, vulnerabilitySoftwaresicherheit beginnt beim Hersteller nicht beim Nutzer.Die Aussagen von Jen Easterly, bis Januar 2025 Direktorin der US-Bundesbehörde CISA (Cybersecurity and Infrastructure Security Agency), bringen es auf den Punkt: ‘Sichere Software ist nicht billig oder einfach umzusetzen aber es ist der einzig gangbare Weg, um IT-Systeme nachhaltig zu schützen.”Easterly zog in der Vergangenheit auch immer wieder…
-
GitHub package limit put law firm in security bind
The most dangerous time for enterprise security? One month after an acquisitionNearly 10% of employee genAI prompts include sensitive dataThe SolarWinds $4.4 billion acquisition gives CISOs what they least want: Uncertainty> First seen on csoonline.com Jump to article: www.csoonline.com/article/3991286/github-package-limit-put-law-firm-in-security-bind.html
-
Poor DNS hygiene is leading to domain hijacking
Tags: attack, authentication, ciso, cloud, control, credentials, detection, dns, email, exploit, incident response, intelligence, threat, toolDNS hijacking comes in many forms: DNS hijacking comes in many forms. In 2019, CSO inteviewed Paul Vixie, a DNS system contributor, about the need to strengthen security. We later wrote about the problem of abandoned domain names. And things haven’t changed a lot since then. Most CISOs may be familiar with typosquatting, where “firm.com”…
-
Poor DNS hygiene is leading to domain hijacking: Report
Tags: attack, authentication, ciso, cloud, control, credentials, detection, dns, email, exploit, incident response, intelligence, threat, toolDNS hijacking comes in many forms: DNS hijacking comes in many forms. In 2019, CSO inteviewed Paul Vixie, a DNS system contributor, about the need to strengthen security. We later wrote about the problem of abandoned domain names. And things haven’t changed a lot since then. Most CISOs may be familiar with typosquatting, where “firm.com”…
-
Let’s Talk About SaaS Risk Again”¦ This Time, Louder.
By Kevin Hanes, CEO of Reveal Security A few weeks ago, I shared a thought that sparked a lot of discussion: SaaS is not a black box we can ignore. It’s a rich, dynamic attack surface and one that attackers are increasingly targeting. That urgency was echoed powerfully in JPMorgan CISO Patrick Opet’s open letter…
-
Former Unilever CISO Kirsten Davies to Take Pentagon Post
Private-Sector Cyber Leader Kirsten Davies Tapped to Lead DoD IT and Security. President Donald Trump has nominated Kirsten Davies to serve as CIO of the Department of Defense – a pivotal role in modernizing the Pentagon’s sprawling digital infrastructure. The nomination was submitted to Congress and has been referred to the Committee on Armed Services…
-
8 KI-Sicherheitsrisiken, die Unternehmen übersehen
Tags: access, ai, api, application-security, authentication, cisco, ciso, compliance, cyber, cyberattack, cybersecurity, data, data-breach, framework, governance, hacker, injection, LLM, RedTeam, risk, risk-management, security-incident, software, threat, tool, vulnerabilityIn ihrem Wettlauf um Produktivitätssteigerungen durch generative KI übersehen die meisten Unternehmen die damit verbundenen Sicherheitsrisiken.Laut einer Studie des Weltwirtschaftsforums, die in Zusammenarbeit mit Accenture durchgeführt wurde, versäumen es 63 Prozent der Unternehmen, die Sicherheit von KI-Tools vor deren Einsatz zu überprüfen. Dadurch gehen sie eine Reihe von Risiken für ihr Unternehmen ein.Dies gilt sowohl…
-
EU-Schwachstellendatenbank als Fundament moderner Sicherheitsprozesse
Die Europäische Union hat am 13. Mai 2025 die European-Vulnerability-Database (EUVD) offiziell gestartet. Ziel dieser neuen Plattform ist es, aggregierte, zuverlässige und handlungsorientierte Informationen über Schwachstellen in Informations- und Kommunikationstechnologie (IKT)-Produkten und -Dienstleistungen bereitzustellen. Die EU-Schwachstellendatenbank könnte ein Fundament für moderner Sicherheitsprozesse im Unternehmen sein. Ein Kommentar von Adam Marrè, CISO bei Arctic Wolf. ‘Schwachstellendatenbanken…

