article thumbnail

Today’s CISO Insights – How to Tackle the Quantum Threat

CyberSecurity Insiders

This is why CISOs everywhere should be concerned. CISOs should begin to familiarize themselves with these and evaluate their potential suitability for adoption. Once that ecosystem is understood and its supporting cryptology has been identified, CISOs should develop a plan that considers quantum-resistant technology.

CISO 133
article thumbnail

Top 5 Cyber Predictions for 2024: A CISO Perspective

Security Boulevard

The fall of VPNs and firewalls The cyberthreats and trends of 2023 send a clear message to organizations: they must evolve their security strategies to the times and embrace a zero trust architecture. The post Top 5 Cyber Predictions for 2024: A CISO Perspective appeared first on Security Boulevard.

CISO 104
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Years overdue, the profile of the CISO begins to rise as cyber grabs attention in boardrooms

SC Magazine

While technically part of the c-suite, CISOs historically received less attention within a company than your average CEO or chief financial officer. CISOs] are in more conversations, they’re asked for input,” said Leo Taddeo, chief security officer for Cyxtera. Our profile is certainly getting higher. Failure to communicate.

CISO 115
article thumbnail

Why CISOs at gaming companies need to reimagine security

SC Magazine

The hack of Words with Friends in 2019 was high-profile, but today’s columnist, Yuval Elddad of CYE, says CISOs at all gaming companies have to take a closer look at the growing threats to online gaming platforms. In 2019, Zynga’s popular online game, Words with Friends , was hacked, resulting in the breach of 218 million user accounts.

CISO 94
article thumbnail

Security Affairs newsletter Round 467 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs

Crooks manipulate GitHub’s search results to distribute malware BatBadBut flaw allowed an attacker to perform command injection on Windows Roku disclosed a new security breach impacting 576,000 accounts LastPass employee targeted via an audio deepfake call TA547 targets German organizations with Rhadamanthys malware CISA adds D-Link multiple (..)

article thumbnail

Grandson of FISMA: Why We Desperately Need New Cybsersecurity Legislation from the 117th Congress

Cisco Security

Further to the topic of governance, FISMA decided to subordinate the CISO to the CIO, which is an organizational design no longer in favor among enterprises throughout the Fortune 500 and Global 2000. The modern CISO is more than “IT security.” He has also serviced as the CISO of Leonardo DRS and Cubic Global Defense.

CISO 104
article thumbnail

IoT Devices a Huge Risk to Enterprises

eSecurity Planet

The increasingly distributed nature of IT – with data and applications living in and being accessed through the cloud, outside of traditional data centers protected by firewalls and antivirus software – is helping to fuel the zero-trust push, which states that identity is key. ” Most Devices Communicate in Plaintext.

IoT 145