Tag: ciso
-
Treat AI like a human: Redefining cybersecurity
In this Help Net Security interview, Doug Kersten, CISO of Appfire, explains how treating AI like a human can change the way cybersecurity professionals use AI tools. He … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2024/12/03/doug-kersten-appfire-ai-oversight/
-
Does Your Company Need a Virtual CISO?
With cybersecurity talent hard to come by and companies increasingly looking for guidance and best practices, virtual and fractional chief information security officers can make a lot of sense. First seen on darkreading.com Jump to article: www.darkreading.com/cybersecurity-operations/does-your-company-need-virtual-ciso
-
AWS launches tools to tackle evolving cloud security threats
The increasing sophistication and scale of cyber threats pose a growing challenge for enterprises managing complex cloud environments. Security teams often face overwhelming volumes of alerts, fragmented workflows, and limited tools to identify and respond to attack patterns spanning multiple events.Amazon Web Services (AWS) is addressing these challenges with two significant updates to its cloud…
-
Zeitgemäße Zugriffsverwaltung in wenigen Schritten optimieren
Tags: cisoCISOs sollten die genannten sechs Punkte bei der Prüfung ihrer IGA-Lösungen berücksichtigen, um ein klares Bild davon zu bekommen, wo sie auf dem Weg … First seen on infopoint-security.de Jump to article: www.infopoint-security.de/zeitgemaesse-zugriffsverwaltung-in-wenigen-schritten-optimieren/a37625/
-
Venafi Machine Identity Security Summit 2024 – Trends, die die Sicherheit von Maschinenidentitäten beeinflussen
Das sechste jährliche Gipfeltreffen bringt zukunftsorientierte CISOs, InfoSec-Führungskräfte, PKI-Administratoren, Plattformingenieure und andere Bran… First seen on infopoint-security.de Jump to article: www.infopoint-security.de/venafi-machine-identity-security-summit-2024-trends-die-die-sicherheit-von-maschinenidentitaeten-beeinflussen/a38206/
-
Der Weg zu einer sicheren Daten-Festung mit Data Governance
CISOs und CIOs sind in einer einzigartigen Position, um diese Zusammenarbeit voranzutreiben. Eine wirkungsvolle Option ist die Einrichtung eines Data … First seen on infopoint-security.de Jump to article: www.infopoint-security.de/der-weg-zu-einer-sicheren-daten-festung-mit-data-governance/a38651/
-
In der Verantwortung: Warum für CISOs viel auf dem Spiel steht
Tags: cisoArbeitsbelastung und das Schreckgespenst der persönlichen Haftung für Vorfälle belasten die Sicherheitsverantwortlichen so sehr, dass viele von ihnen … First seen on welivesecurity.com Jump to article: www.welivesecurity.com/de/business-security/in-der-verantwortung-warum-fur-cisos-viel-auf-dem-spiel-steht/
-
Blackbasta Alert Action for CISOs
Tags: cisoOperating SOCKS proxy We observed them managing at least one SOCKS proxy server that is publicly listed. Although we couldn’t verify it, we suspect th… First seen on research.kudelskisecurity.com Jump to article: research.kudelskisecurity.com/2024/05/31/blackbasta-alert-action-for-cisos/
-
The Impacts of the SEC Cyber Rules on Incident Disclosure, CISO Liability
First seen on duo.com Jump to article: duo.com/decipher/the-impact-of-sec-cyber-rules-on-incident-disclosure-ciso-liability
-
‘The Tidal Wave Coming At Everybody:’ The Issue of Data Sprawl and Identity
CISOs sound off on how security teams are approaching the massive sprawl of different data and accounts across their ecosystem, especially with the pr… First seen on duo.com Jump to article: duo.com/decipher/the-tidal-wave-coming-at-everybody-the-issue-of-data-sprawl-and-identity
-
Wendy Nather on the ‘Topics That Are Distracting CISOs’
Wendy Nather, distinguished cybersecurity leader and director of strategic engagements at Cisco, talks to Lindsey O’Donnell-Welch, executive editor wi… First seen on duo.com Jump to article: duo.com/decipher/wendy-nather-on-the-topics-that-are-distracting-cisos
-
Security-FinOps collaboration can reap hidden cloud benefits: 11 tips
For enterprises operating on the cloud, security and cost management are rising concerns.Typically, these issues are addressed in silos, with cyber teams and FinOps teams pursuing their charters and priorities separately, and with little thought given to collaboration opportunities between these teams that could be leveraged for better business results.As CIOs seek to gain more…
-
T-Mobile Says Sensitive Customer Data Wasn’t Impacted In China-Linked Attack
T-Mobile CISO Jeff Simon said a post Wednesday that ‘our defenses protected our sensitive customer information,’ in the wake of reports about a major hacking operation by a China-linked threat actor targeting internet service providers. First seen on crn.com Jump to article: www.crn.com/news/security/2024/t-mobile-says-sensitive-customer-data-wasn-t-impacted-in-china-linked-attack
-
Cybersecurity’s oversimplification problem: Seeing AI as a replacement for human agency
Tags: access, ai, awareness, business, ciso, computer, cyber, cybersecurity, data, election, infrastructure, intelligence, Internet, jobs, technology, threat, tool, trainingThere’s a philosophical concept called the Great Man Theory that suggests history is all about how significant individuals act as centers of gravity for society as a whole, think Alexander the Great, Napoleon Bonaparte, Queen Elizabeth I, or the founding fathers of the American Revolution.Recent research suggests that cybersecurity and related professions are developing a…
-
AWS CISO details automated cybersecurity tools for customers
Chris Betz, CISO at AWS, discusses how three internal tools are designed to automatically identify and mitigate threats for the cloud giant’s customers. First seen on Jump to article: /www.techtarget.com/searchsecurity/news/366616344/AWS-CISO-details-automated-cybersecurity-tools-for-customers
-
A CISO’s Guide to Bot Protection Effectiveness Breaking Open the Black Box
Learn how to validate bot protection effectiveness, mitigate business risks, and ensure your defenses align with operational and regulatory needs. First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/11/a-cisos-guide-to-bot-protection-effectiveness-breaking-open-the-black-box/
-
Marco Eggerling gibt CISO-Tipps für effektive E-Mail-Sicherheit
First seen on datensicherheit.de Jump to article: www.datensicherheit.de/marco-eggerling-ciso-tipps-effektivitaet-e-mail-sicherheit
-
What the cyber community should expect from the Trump transition
Tags: ceo, cisa, ciso, cyber, cybersecurity, defense, disinformation, election, governance, government, infrastructure, intelligence, jobs, military, technology, threat, ukraineDonald Trump’s decisive win in this year’s presidential election promises to deliver radical changes to how the US government operates.Trump’s positions on a range of social, economic, and military issues, from immigration to human rights to the defense of Ukraine, represent significantly different postures from those of the current Biden administration and are arguably more…
-
17 hottest IT security certs for higher pay today
Tags: access, ai, attack, automation, blockchain, business, ceo, cisa, ciso, cloud, communications, conference, container, control, credentials, cryptography, cyber, cybersecurity, data, defense, detection, encryption, exploit, finance, fortinet, google, governance, group, guide, hacker, incident response, infosec, infrastructure, intelligence, Internet, jobs, monitoring, network, penetration-testing, privacy, reverse-engineering, risk, risk-management, skills, software, technology, threat, tool, training, windowsWith the New Year on the horizon, many IT professionals may be looking to improve their careers in 2025 but need direction on the best way. The latest data from Foote Partners may provide helpful signposts.Analyzing more than 638 certifications as part of its 3Q 2024 “IT Skills Demand and Pay Trends Report,” Foote Partners…
-
FBI pierces ‘anonymity’ of cryptocurrency, secret domain registrars in Scattered Spider probe
The US Justice Department on Wednesday announced the arrest of five suspected members of the notorious Scattered Spider phishing crew, but the most interesting part of the case was a US Federal Bureau of Investigation (FBI) document detailing how easily the feds were able to track the phishers’ movements and activities. In recent years, services that push…
-
Act fast to snuff out employee curiosity over ‘free’ AI apps
The word “free” has always tempted employees who are looking for an app or template to make their work easier. These days, combine “free” with “AI” and the lure is almost irresistible.Since the release of ChatGPT in late 2022, free AI-themed apps have exploded. Unfortunately, some are created by threat actors. One of the latest…
-
CISO-Checkliste für moderne E-Mail-Sicherheit
Die klassische E-Mail bleibt der primäre Bedrohungsvektor im Cyberspace: Von allen Cyberangriffen erfolgen die meisten über den digitalen Postweg. Seit 2017 haben sich die extremen finanziellen Verluste durch Angriffe über E-Mail auf 2,5 Milliarden US-Dollar vervierfacht. Ein solcher Cyberangriff kann dann zu Datenverlust, Identitätsdiebstahl, Finanzbetrug, Rufschädigung, rechtlichen Konsequenzen, Betriebsunterbrechungen und mehr führen. Deshalb ist die…
-
Effektive Kommunikation für CISOs – Wie CISOs den Vorstand für IT-Risiken sensibilisieren
First seen on security-insider.de Jump to article: www.security-insider.de/cisos-kommunikation-von-it-sicherheitsrisiken-a-e0f9b7f972b5f5fafd7a58e357ba2118/
-
Corporate security teams want specialty cyber roles as regulatory pressure grows
A report from IANS and Artico Search shows businesses are looking to bring on chiefs of staff, business CISOs and privacy officers as federal and state regulators push for greater compliance. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/corporate-security-cyber-regulatory/733741/

