article thumbnail

CISO Stories Podcast: Doing Privacy Right vs. Doing Privacy Rights

Security Boulevard

Eric Schmidt (CEO Google 2001-2007) famously noted that his company’s policy was to get ‘right up to the creepy line and not cross it.’ The post CISO Stories Podcast: Doing Privacy Right vs. Doing Privacy Rights appeared first on Security Boulevard. When does this become an invasion of privacy? .

CISO 52
article thumbnail

Datto CISO Ryan Weeks Contributes to Ransomware Task Force's Comprehensive Framework to Combat Ransomware

CyberSecurity Insiders

Datto CISO Ryan Weeks is a core member of the RTF, a broad coalition of more than 60 experts in industry, government, law enforcement, and international organizations coming together in the fight against ransomware. “The The release of these findings is an important step both in the U.S. The time for concerted, coordinated action is now.

CISO 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Episode 247: Into the AppSec Trenches with Robinhood CSO Caleb Sima

The Security Ledger

As a security analyst at the pioneering security firm Internet Security Systems (ISS) Caleb was happy to prove them wrong and turned what he learned exposing security weaknesses in corporate websites into a thriving business: SPI Dynamics, which was sold to HP in 2007. Once more unto the (data) breach!

CSO 52
article thumbnail

Top VC Firms in Cybersecurity of 2022

eSecurity Planet

Company Sector Year Status Exabeam UEBA 2021 Private Cato Networks SASE 2020 Private Confluera Cloud XDR 2019 Private Aqua Container security 2017 Private Netskope SASE 2017 Private Zscaler Zero trust 2012 Nasdaq: ZS Sailpoint Identity management 2007 Private. New Enterprise Associates (NEA). YL Ventures.

article thumbnail

As Internet-Connected Medical Devices Multiply, So Do Challenges

Cisco Security

Cisco Advisory CISO Wolfgang Goerlich noted that one unique challenge for securing medical devices is that they often can’t be patched or replaced. Imagine the computer you bought in 2007 trying to run the operating system you have now.). And each device is designed for a specific purpose.

Internet 145
article thumbnail

A Question of Identity: The Evolution of Identity & Access Management

SecureWorld News

In this case, CISOs must manage the risks due to the technology debt. CISOs must now envision and enact holistic supply chain identity strategies for provisioning identities to individuals, systems, and IoT devices outside of but connected to the company. Adoption of ZTNA can help save money and minimize enterprise risk.

IoT 109
article thumbnail

Cyber Heroes Recognized in SecureWorld 2024 Conference Theme

SecureWorld News

At SecureWorld, we consider all of our Advisory Council members—the CISOs, BISOs, and senior leaders who help us plan each of our 15 in-person conferences—to be true cyber heroes. Joe died in 2007. So, it's fitting that the theme for our 2024 conferences is "Legacies Untold: Revealing Cybersecurity's Hidden Figures."