Remove Architecture Remove Blog Remove CISO Remove Information Security
article thumbnail

People Skills Outweigh Technical Prowess in the Best Security Leaders

SecureWorld News

Michael Gregg, the CISO for the State of North Dakota, speaks across the country, including keynoting at SecureWorld Detroit on Sep. It's no wonder after he speaks he has a line of folks waiting to learn more from him, or just to shake his hand and say thanks for his information sharing. 19 and at SecureWorld Dallas on Oct.

CISO 103
article thumbnail

ConnectWise Quietly Patches Flaw That Helps Phishers

Krebs on Security

29, roughly the same time Pyle published a blog post about his findings , ConnectWise issued an advisory warning users to be on guard against a new round email phishing attempts that mimic legitimate email alerts the company sends when it detects unusual activity on a customer account. ET: Included statement from ConnectWise CISO.

Phishing 251
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SPOTLIGHT: Women in Cybersecurity

McAfee

“At this year’s Conference 46 percent of all keynote speakers were women,” according to Sandra Toms, VP and curator, RSA Conference, in a blog she posted on the last day of this year’s event. Forrester also predicts that the number of women CISOs at Fortune 500 companies will rise to 20 percent in 2019 , compared with 13 percent in 2017.

article thumbnail

GUEST ESSAY: In pursuit of smarter cybersecurity — to overcome complex risks and grow revenue

The Last Watchdog

However, security – the often overlooked and undervalued visitor – is struggling to communicate across the table. When it comes down to it, C-level goals and CISO initiatives are not all that misaligned. About the essayist: Chris Reffkin is chief information security officer at cybersecurity software and services provider Fortra.

Risk 214
article thumbnail

Firms with exposed IoT have a higher concentration of other security problems

SC Magazine

For example, companies with exposed IoT are more than 50% more likely to have email security issues, according to a new report and blog post from the Cyentia Institute and RiskRecon. But what does that correlation mean for chief information security officers? So, how can CISOs operationalize that kind of information?

IoT 98
article thumbnail

Executive Spotlight: Q&A with Chief Information Officer, Scott Howitt

McAfee

But one thing remains the same: our passion and commitment to make the world a safer, more secure place. In this new blog series, you’ll meet some of the executives devoted to tackling today’s most pressing security concerns and innovating for the future. And that passion starts with our people.

CISO 78
article thumbnail

Holes in Linux Kernel Could Pose Problems for Red Hat, Ubuntu, Other Distros

eSecurity Planet

The two flaws – CVE-2021-33909 and CVE-2021-33910, respectively – were disclosed by vulnerability management vendor Qualys in a pair of blogs that outlined the threat to Linux OSes from such companies Red Hat, Ubuntu, Debian and Fedora. ‘Noisy’ Vulnerabilities.