Tag: strategy
-
15 years in, zero trust remains elusive, with AI rising to complicate the challenge
Legacy systems that weren’t designed for zero trust principles,Fragmented identity and access tools that make unified enforcement difficult, andCultural and organizational resistance to changing long-standing trust models.Kyle Wickert, field CTO at AlgoSec, says zero trust remains one of the most misunderstood transformations in cybersecurity.”Many organizations still hesitate to pursue it because they associate zero trust…
-
What security leaders should watch for when companies buy or sell a business
In this Help Net Security video, Lane Sullivan SVP, CISO and Strategy Officer at Concentric AI, explains what security leaders should think about during mergers, acquisitions, … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/12/05/ma-security-checklist-video/
-
What security leaders should watch for when companies buy or sell a business
In this Help Net Security video, Lane Sullivan SVP, CISO and Strategy Officer at Concentric AI, explains what security leaders should think about during mergers, acquisitions, … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/12/05/ma-security-checklist-video/
-
What security leaders should watch for when companies buy or sell a business
In this Help Net Security video, Lane Sullivan SVP, CISO and Strategy Officer at Concentric AI, explains what security leaders should think about during mergers, acquisitions, … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/12/05/ma-security-checklist-video/
-
Suspicious traffic could be testing CDN evasion, says expert
“Cf-Warp-Tag-Id,” which is associated with Cloudflare’s Warp VPN service;”X-Fastly-Request-Id,”, which is associated with the Fastly CDN;”X-Akamai-Transformed,” a header added by Akamai;and a puzzler: “X-T0Ken-Inf0.” Ullrich thinks it might contain a form of authentication token, but isn’t sure.In an interview, he said one explanation is that a threat actor is trying to get around a CDN’s…
-
Suspicious traffic could be testing CDN evasion, says expert
“Cf-Warp-Tag-Id,” which is associated with Cloudflare’s Warp VPN service;”X-Fastly-Request-Id,”, which is associated with the Fastly CDN;”X-Akamai-Transformed,” a header added by Akamai;and a puzzler: “X-T0Ken-Inf0.” Ullrich thinks it might contain a form of authentication token, but isn’t sure.In an interview, he said one explanation is that a threat actor is trying to get around a CDN’s…
-
Lawmakers question White House on strategy for countering AI-fueled hacks
The Trump administration has said little about how it will prevent hackers from abusing AI. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/ai-anthropic-cyberattack-senate-letter-white-house/807044/
-
Five-page draft Trump administration cyber strategy targeted for January release
The six-pillar document covers a lot of ground in a short space, and could be followed by an executive order implementing it, according to sources familiar with the draft. First seen on cyberscoop.com Jump to article: cyberscoop.com/trump-national-cybersecurity-strategy-2025-release/
-
Hybride KI als neuer Standard für Finanzdienstleistungen
97 Prozent der Finanzunternehmen kämpfen bei der Implementierung mit Datensilos. Datensicherheit bleibt das größte Hindernis für erfolgreichen KI-Einsatz. Cloudera hat in Zusammenarbeit mit Finextra Research eine neue globale Studie veröffentlicht. Diese basiert auf einer Umfrage von 155 Führungskräften weltweit. Die Ergebnisse zeigen, dass der Einsatz hybrider KI zu einer unverzichtbaren Strategie in der Finanzdienstleistungsbranche… First…
-
Hybride KI als neuer Standard für Finanzdienstleistungen
97 Prozent der Finanzunternehmen kämpfen bei der Implementierung mit Datensilos. Datensicherheit bleibt das größte Hindernis für erfolgreichen KI-Einsatz. Cloudera hat in Zusammenarbeit mit Finextra Research eine neue globale Studie veröffentlicht. Diese basiert auf einer Umfrage von 155 Führungskräften weltweit. Die Ergebnisse zeigen, dass der Einsatz hybrider KI zu einer unverzichtbaren Strategie in der Finanzdienstleistungsbranche… First…
-
UK national security strategy failing to account for online world
The UK government’s national security strategy is falling short on online matters, according to the independent reviewer of terrorism First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366635584/UK-national-security-strategy-failing-to-account-for-online-world
-
CSO 30 Awards 2025: Celebrating Excellence, Innovation and Leadership in Cybersecurity
Tags: advisory, ai, automation, awareness, backup, business, ceo, cio, cyber, cybersecurity, data, endpoint, finance, google, governance, healthcare, incident response, infosec, jobs, office, phishing, ransomware, resilience, risk, service, strategy, technology, threatUK CSO 30 2025 winner Greg Emmerson (right) with judge Andrew Barber (left) CSO UK / FoundryGreg Emmerson stood out for transforming both the culture and capability of Applegreen’s security organization. Emmerson established regional Centres of Excellence to strengthen collaboration and skill development across global teams, modernizing operations through Continuous Threat Exposure Management and enterprise-wide canary tooling. By unifying identities and embedding advanced…
-
CSO 30 Awards 2025: Celebrating Excellence, Innovation and Leadership in Cybersecurity
Tags: advisory, ai, automation, awareness, backup, business, ceo, cio, cyber, cybersecurity, data, endpoint, finance, google, governance, healthcare, incident response, infosec, jobs, office, phishing, ransomware, resilience, risk, service, strategy, technology, threatUK CSO 30 2025 winner Greg Emmerson (right) with judge Andrew Barber (left) CSO UK / FoundryGreg Emmerson stood out for transforming both the culture and capability of Applegreen’s security organization. Emmerson established regional Centres of Excellence to strengthen collaboration and skill development across global teams, modernizing operations through Continuous Threat Exposure Management and enterprise-wide canary tooling. By unifying identities and embedding advanced…
-
Ukrainian Hackers Target Russian Aerospace and Defense Sectors
Multiple Ukrainian hacktivist groups have launched an extensive spearphishing campaign targeting Russia’s critical aerospace and defence industries, according to a new threat intelligence report by Intrinsec. The coordinated attacks between June and September 2025 represent an escalating cyber warfare strategy aimed at disrupting Russian military capabilities and civilian aviation operations.”‹ The campaign involves several prominent…
-
Ukrainian Hackers Target Russian Aerospace and Defense Sectors
Multiple Ukrainian hacktivist groups have launched an extensive spearphishing campaign targeting Russia’s critical aerospace and defence industries, according to a new threat intelligence report by Intrinsec. The coordinated attacks between June and September 2025 represent an escalating cyber warfare strategy aimed at disrupting Russian military capabilities and civilian aviation operations.”‹ The campaign involves several prominent…
-
Creative cybersecurity strategies for resource-constrained institutions
In this Help Net Security interview, Dennis Pickett, CISO at RTI International, talks about how research institutions can approach cybersecurity with limited resources and … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/12/02/dennis-pickett-rti-international-research-institutions-cybersecurity/
-
Creative cybersecurity strategies for resource-constrained institutions
In this Help Net Security interview, Dennis Pickett, CISO at RTI International, talks about how research institutions can approach cybersecurity with limited resources and … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/12/02/dennis-pickett-rti-international-research-institutions-cybersecurity/
-
Post-Quantum Key Exchange for MCP Authentication
Explore post-quantum key exchange methods for securing Model Context Protocol (MCP) authentication. Learn about PQuAKE, implementation strategies, and future-proofing AI infrastructure against quantum threats. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/11/post-quantum-key-exchange-for-mcp-authentication/
-
Granular Access Control Policies for Post-Quantum AI Environments
Learn how to implement granular access control policies in post-quantum AI environments to protect against advanced threats. Discover strategies for securing Model Context Protocol deployments with quantum-resistant encryption and context-aware access management. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/11/granular-access-control-policies-for-post-quantum-ai-environments/
-
Post-Quantum Key Exchange for MCP Authentication
Explore post-quantum key exchange methods for securing Model Context Protocol (MCP) authentication. Learn about PQuAKE, implementation strategies, and future-proofing AI infrastructure against quantum threats. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/11/post-quantum-key-exchange-for-mcp-authentication/
-
Granular Access Control Policies for Post-Quantum AI Environments
Learn how to implement granular access control policies in post-quantum AI environments to protect against advanced threats. Discover strategies for securing Model Context Protocol deployments with quantum-resistant encryption and context-aware access management. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/11/granular-access-control-policies-for-post-quantum-ai-environments/
-
12 signs the CISO-CIO relationship is broken, and steps to fix it
The CIO-CISO relationship matters: The CIO and CISO need to have a strong relationship for either of them to succeed, says MK Palmore, founder and principal adviser for advisory firm Apogee Global RMS and a former director in the Office of the CISO at Google Cloud.”It’s critical that those in these two positions get along…
-
Russian Tomiris APT Adopts >>Polyglot<< Strategy, Hijacking Telegram/Discord as Covert C2 for Diplomatic Spies
The post Russian Tomiris APT Adopts >>Polyglot
-
Russian Tomiris APT Adopts >>Polyglot<< Strategy, Hijacking Telegram/Discord as Covert C2 for Diplomatic Spies
The post Russian Tomiris APT Adopts >>Polyglot
-
Empathetic policy engineering: The secret to better security behavior and awareness
Tags: awareness, business, ciso, cyberattack, cybersecurity, data, framework, group, phishing, regulation, risk, risk-assessment, strategy, threat, trainingIn many companies, IT security guidelines encounter resistance because employees perceive them as obstructive or impractical. This makes implementation difficult, undermines effectiveness, and strains collaboration between the security department and business units.As a result, instead of being seen as a partner, cybersecurity is often perceived as a hindrance, a fatal security risk. For CISOs, this…
-
Empathetic policy engineering: The secret to better security behavior and awareness
Tags: awareness, business, ciso, cyberattack, cybersecurity, data, framework, group, phishing, regulation, risk, risk-assessment, strategy, threat, trainingIn many companies, IT security guidelines encounter resistance because employees perceive them as obstructive or impractical. This makes implementation difficult, undermines effectiveness, and strains collaboration between the security department and business units.As a result, instead of being seen as a partner, cybersecurity is often perceived as a hindrance, a fatal security risk. For CISOs, this…
-
Unifying Cloud Strategy to Unlock AI Potential
Talcott Financial Group’s Dalavi on Oracle to Azure Migration and AI Innovation. Talcott Financial Group’s move from a dual-cloud setup to a unified Azure environment is reshaping performance, efficiency and AI readiness, says Sudhakar Dalavi, head of software engineering. He explains how data unification and continuous learning drive the next phase of innovation. First seen…

