article thumbnail

The US Government says companies should take more responsibility for cyberattacks. We agree.

Google Security

Ransomware affects every industry, in every corner of the globe – and it thrives on pre-existing vulnerabilities: insecure software, indefensible architectures, and inadequate security investment. They increase their return on investment by exploiting outdated and insecure technology systems that are too hard to defend.

article thumbnail

MY TAKE: Coping with security risks, compliance issues spun up by ‘digital transformation’

The Last Watchdog

“The cloud is kind of dragging this movement along and DevOps and security are center stage, at the moment.” Shifting requirements One way to understand the security hazards is to think about the radical changes being imposed on the traditional enterprise technology stack.

article thumbnail

CISO workshop slides

Notice Bored

Security Posture suggests a confusing mix of application and account security metrics. I'm really not sure what ' security posture ' even means in this context, and curious as to why those two aspects in particular have been selected as example metrics.

CISO 63