article thumbnail

The CSO role today: Responsibilities and requirements for the top security job

CSO Magazine

and one that our founding editor Derek Slater offered up to readers way back in 2005—heck, if there's one website you ought to be able to trust to tell you what a CSO is, it's CSOonline. A CSO is a departmental leader responsible for information security, corporate security or both. At many companies, the term CSO is still used in this way.

CSO 116
article thumbnail

NEW TECH: Exabeam positions SIEM technology to help protect IoT, OT systems

The Last Watchdog

Security information and event management systems — SIEMs — have been around since 2005, but their time may have come at last. With CIOs and CISOs now facing increased responsibilities, SIEMs have huge untapped potential for supporting new use cases.

IoT 179
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

In Search of… ISO 27001:2013, 27017:2015 & 27018:2019 Certification

Duo's Security Blog

ISO is responsible for issuing internationally-accepted standards for (seemingly) everything, from a standard for brewing tea (3103:2019) to ski boots (5355:2005) to the two-letter country code that can form a country’s domain address (3166) to standards for information security. Josh Yavor, CISO, Duo Security, now part of Cisco.

article thumbnail

In Search of… ISO 27001:2013, 27017:2015 & 27018:2019 Certification

Duo's Security Blog

ISO is responsible for issuing internationally-accepted standards for (seemingly) everything, from a standard for brewing tea (3103:2019) to ski boots (5355:2005) to the two-letter country code that can form a country’s domain address (3166) to standards for information security. Josh Yavor, CISO, Duo Security, now part of Cisco.

article thumbnail

The Hacker Mind Podcast: Digital Forensics

ForAllSecure

It was for UNIX systems and it was created by Dan Farmer and Wheat-say Vene-ma, who then co-authored a book in 2005 called Forensic Discovery. Vamosi: So you’re CISO at a major corporation and all of sudden there’s been a ransomware attack in your network, and it’s spreading throughout your infrastructure.

article thumbnail

The bleak picture of two-factor authentication adoption in the wild

Elie

Future work Moving forward, I agree that the community would benefit from a more rigorous study with clear recommendations that can be used as a reference by CISOs, CTOs, policy makers, and other key opinion formers. in 2005 and TOTP in. With this out of the way, let’s delve into the study results. HOTP was standardized in the.

article thumbnail

Top VC Firms in Cybersecurity of 2022

eSecurity Planet

YL offers hands-on support for startup leaders in addition to an extensive network of cybersecurity industry leaders and CISOs. AllegisCyber Capital. AllegisCyber Capital was founded in 1996 to serve the growing cyber business ecosystem. Paladin Capital Group. Ten Eleven Ventures.