Tag: strategy
-
FireTail CEO, Jeremy Snyder, Set to Present at UK Cyber Week 2023 FireTail Blog
Tags: api, attack, best-practice, breach, ceo, cloud, cyber, cybersecurity, data, defense, detection, office, open-source, risk, strategy, vulnerabilityNov 11, 2025 – Jeremy Snyder – On April 5, 2023, during UK Cyber Week, our CEO Jeremy Snyder will present, “API security – what is it, why you should care, and how to protect your org”. The session, part of the OT & IT Cyber Security track, will explore the rise of APIs and…
-
FireTail CEO, Jeremy Snyder, Set to Present at UK Cyber Week 2023 FireTail Blog
Tags: api, attack, best-practice, breach, ceo, cloud, cyber, cybersecurity, data, defense, detection, office, open-source, risk, strategy, vulnerabilityNov 11, 2025 – Jeremy Snyder – On April 5, 2023, during UK Cyber Week, our CEO Jeremy Snyder will present, “API security – what is it, why you should care, and how to protect your org”. The session, part of the OT & IT Cyber Security track, will explore the rise of APIs and…
-
Your passwordless future may never fully arrive
Tags: access, api, attack, authentication, breach, ceo, ciso, cloud, compliance, credentials, cyber, cybersecurity, group, infrastructure, insurance, mfa, network, passkey, password, risk, service, strategy, technology, vpn, zero-trustAll-in passwordless strategies fall short: Jim Taylor, chief product and strategy officer at RSA, says today’s enterprise environment and existing passwordless approaches make “100% passwordless not possible just yet,” adding that “85% is possible, with the 15% representing the complicated and the very specialized” needs such as “security admins who need to log in to…
-
Your passwordless future may never fully arrive
Tags: access, api, attack, authentication, breach, ceo, ciso, cloud, compliance, credentials, cyber, cybersecurity, group, infrastructure, insurance, mfa, network, passkey, password, risk, service, strategy, technology, vpn, zero-trustAll-in passwordless strategies fall short: Jim Taylor, chief product and strategy officer at RSA, says today’s enterprise environment and existing passwordless approaches make “100% passwordless not possible just yet,” adding that “85% is possible, with the 15% representing the complicated and the very specialized” needs such as “security admins who need to log in to…
-
Digitale Souveränität als Strategie – Update: Internationaler Strafgerichtshof setzt auf Open Source statt auf Microsoft
First seen on security-insider.de Jump to article: www.security-insider.de/internationaler-strafgerichtshof-setzt-auf-open-source-statt-auf-microsoft-a-277169fd16fe263acd309a43b53f22f9/
-
With Geopolitical Uncertainty Rising, Is It Time to Reimagine Your GCC Nearshore Strategy?
Tags: strategyThink of your global capability center (GCC) strategy as a high-wire act. For years, it’s been about balance, cost savings on one side, operational efficiency…Read More First seen on securityboulevard.com Jump to article: https://securityboulevard.com/2025/11/with-geopolitical-uncertainty-rising-is-it-time-to-reimagine-your-gcc-nearshore-strategy/
-
With Geopolitical Uncertainty Rising, Is It Time to Reimagine Your GCC Nearshore Strategy?
Tags: strategyThink of your global capability center (GCC) strategy as a high-wire act. For years, it’s been about balance, cost savings on one side, operational efficiency…Read More First seen on securityboulevard.com Jump to article: https://securityboulevard.com/2025/11/with-geopolitical-uncertainty-rising-is-it-time-to-reimagine-your-gcc-nearshore-strategy/
-
With Geopolitical Uncertainty Rising, Is It Time to Reimagine Your GCC Nearshore Strategy?
Tags: strategyThink of your global capability center (GCC) strategy as a high-wire act. For years, it’s been about balance, cost savings on one side, operational efficiency…Read More First seen on securityboulevard.com Jump to article: https://securityboulevard.com/2025/11/with-geopolitical-uncertainty-rising-is-it-time-to-reimagine-your-gcc-nearshore-strategy/
-
CISOs must prove the business value of cyber, the right metrics can help
Cybersecurity as a business function: “The challenge has been that security is put in the wrong organizational structure, with the CISO reporting to the CIO or CTO or chief digital officer,” Oberlaender says. “Security is not foremost a technology problem. Maybe ten or twenty percent is technology. But the rest is people, process and the…
-
CISOs must prove the business value of cyber, the right metrics can help
Cybersecurity as a business function: “The challenge has been that security is put in the wrong organizational structure, with the CISO reporting to the CIO or CTO or chief digital officer,” Oberlaender says. “Security is not foremost a technology problem. Maybe ten or twenty percent is technology. But the rest is people, process and the…
-
CISOs must prove the business value of cyber, the right metrics can help
Cybersecurity as a business function: “The challenge has been that security is put in the wrong organizational structure, with the CISO reporting to the CIO or CTO or chief digital officer,” Oberlaender says. “Security is not foremost a technology problem. Maybe ten or twenty percent is technology. But the rest is people, process and the…
-
Investment in NHIs: A Justified Security Strategy?
How Do Non-Human Identities (NHIs) Transform Cloud Security? Can your organization afford to overlook the security of Non-Human Identities? Machine identities have become as crucial as human identities, bringing unique challenges and opportunities for cybersecurity experts around the globe. The management of NHIs, which are essentially machine identities, ensures robust cloud security by bridging the……
-
NDSS 2025 Qualitative Study On Boards’ Cybersecurity Risk Decision Making
Tags: ciso, conference, cyber, cybersecurity, data-breach, fraud, Internet, network, phishing, risk, strategySESSION Session 2C: Phishing & Fraud 1 Authors, Creators & Presenters: Jens Christian Opdenbusch (Ruhr University Bochum), Jonas Hielscher (Ruhr University Bochum), M. Angela Sasse (Ruhr University Bochum, University College London) PAPER “Where Are We On Cyber?” – A Qualitative Study On Boards’ Cybersecurity Risk Decision Making Boards are increasingly required to oversee the cybersecurity…
-
Balancer hack analysis and guidance for the DeFi ecosystem
Tags: access, attack, blockchain, control, crypto, exploit, finance, flaw, guide, intelligence, monitoring, oracle, radius, risk, software, strategy, threat, tool, update, vulnerabilityTL;DR The root cause of the hack was a rounding direction issue that had been present in the code for many years. When the bug was first introduced, the threat landscape of the blockchain ecosystem was significantly different, and arithmetic issues in particular were not widely considered likely vectors for exploitation. As low-hanging attack paths…
-
Digital health can’t scale if cybersecurity falls behind
Tags: access, ai, attack, breach, cloud, compliance, control, cyber, cyberattack, cybersecurity, data, detection, encryption, endpoint, exploit, framework, GDPR, governance, government, healthcare, HIPAA, identity, infection, intelligence, malicious, network, nist, phishing, privacy, ransomware, regulation, resilience, risk, risk-management, strategy, technology, threat, training, virus, vulnerability, zero-trustThe unique vulnerabilities of AI systems: Traditional security frameworks are not enough for AI. Attacks on algorithms take subtler forms. I often explain to my clients that when you corrupt data, you corrupt intelligence. Data poisoning occurs when malicious data is inserted into the training process, teaching the AI to make wrong decisions later. Imagine…
-
Digital health can’t scale if cybersecurity falls behind
Tags: access, ai, attack, breach, cloud, compliance, control, cyber, cyberattack, cybersecurity, data, detection, encryption, endpoint, exploit, framework, GDPR, governance, government, healthcare, HIPAA, identity, infection, intelligence, malicious, network, nist, phishing, privacy, ransomware, regulation, resilience, risk, risk-management, strategy, technology, threat, training, virus, vulnerability, zero-trustThe unique vulnerabilities of AI systems: Traditional security frameworks are not enough for AI. Attacks on algorithms take subtler forms. I often explain to my clients that when you corrupt data, you corrupt intelligence. Data poisoning occurs when malicious data is inserted into the training process, teaching the AI to make wrong decisions later. Imagine…
-
2026 nichts für schwache CI(S)O-Nerven
Aus Sicht von Forrester bleibt die Lage für IT-(Sicherheits-)Entscheider auch 2026 angespannt.Keine Entwarnung für IT-(Sicherheits-)Entscheider: Die Analysten von Forrester gehen in den Predictions 2026 davon aus, dass die Volatilität 2026 weiter anhält. CIOs und CISOs seien entsprechend gefordert, mit Präzision, Resilienz und strategischer Weitsicht zu führen.Das gilt den Auguren zufolge insbesondere für Künstliche Intelligenz (KI),…

