article thumbnail

Forrester: CISO Budgets Not Immune to Cuts

Security Boulevard

Still, a new report from Forrester Research warned that CISOs mustn’t. The post Forrester: CISO Budgets Not Immune to Cuts appeared first on Security Boulevard.

CISO 87
article thumbnail

CISOs Say Application Security is Broken

Security Boulevard

Nearly three-quarters of CISOs aren’t confident that code in cloud-native architectures is free of vulnerabilities before it goes into production, according to research from Dynatrace. The post CISOs Say Application Security is Broken appeared first on Security Boulevard.

CISO 107
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The White House Memo on Adopting a Zero Trust Architecture: Top Four Tips

Cisco CSR

On the heels of President Biden’s Executive Order on Cybersecurity (EO 14028) , the Office of Management and Budget (OMB) has released a memorandum addressing the heads of executive departments and agencies that “sets forth a Federal zero trust architecture (ZTA) strategy.”

article thumbnail

Why do CISOs Keep Quitting on Florida?

SecureWorld News

Chief Information Security Officers (CISO) have the luxury of being an incredibly hot commodity, so they can pretty much pick and choose where they work, as they are almost guaranteed to have a job waiting for them somewhere. Featured Cybersecurity Government CISO / CSO Original Content

CISO 83
article thumbnail

CISO workshop slides

Notice Bored

A glossy, nicely-constructed and detailed PowerPoint slide deck by Microsoft Security caught my beady this morning.

CISO 59
article thumbnail

Cloud Security Alliance Paper Offers Executive Management Guidance on Factors to Consider When Implementing Serverless Architectures

CyberSecurity Insiders

SEATTLE–( BUSINESS WIRE )–The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today released its C-Level Guidance to Securing Serverless Architectures.

article thumbnail

Tanium Named a Finalist in the 2022 CISO Choice Awards

CyberSecurity Insiders

The CISO Choice Awards 2022 recognizes leaders in key technology and business categories, and the Tanium XEM platform was selected for its leadership in endpoint security. The post Tanium Named a Finalist in the 2022 CISO Choice Awards appeared first on Cybersecurity Insiders

CISO 52
article thumbnail

What’s It Like for a New CISO?

Lenny Zeltser

As of this writing, I’ve spent six months in the role of Chief Information Security Officer (CISO) at Axonius , a rapidly growing technology company.

CISO 57
article thumbnail

Analytics Insight Announces ‘The 10 Most Influential CISOs to Watch in 2021’

CyberSecurity Insiders

& HYDERABAD, India–( BUSINESS WIRE )–Analytics Insight has named ‘ The 10 Most Influential CISOs to Watch in 2021 ’ in its October magazine issue. The magazine issue recognizes ten futuristic CISOs who are reimagining the business world and adopting new ways of working. By integrating business ideologies with security initiatives, these inspiring CISOs ensure seamless operation. Featuring as the Cover Story is Mark Connelly , CISO of Boston Consulting Group.

article thumbnail

New SEI CERT chief and first ever federal CISO: old cybersecurity models have ‘been overcome’

SC Magazine

That includes the architectures, the computing platforms, the algorithms and the people and the process as well. The post New SEI CERT chief and first ever federal CISO: old cybersecurity models have ‘been overcome’ appeared first on SC Media.

CISO 90
article thumbnail

Five considerations for cloud migration, from the House of Representatives CISO

SC Magazine

It’s about how you can do your business mission” in a different environment, with its own requirements for protecting data, Vickers said during his talk at the RSA Show’s Cloud Security Alliance CISO Summit.

article thumbnail

Sunsetting legacy Cybersecurity Process for Better Optimization and Security Modernization

Security Boulevard

A critical part of achieving balanced security is for the organization to execute an architecture optimization. Architecture-driven modernization around cybersecurity along with developing an ongoing modernization strategy helps organizations manage and prepare for emerging threats.

article thumbnail

Startup Traceable turns to CISO investors for next phase of growth

SC Magazine

The new partnership with Silicon Valley CISO Investments will include an additional $250,000, but perhaps more importantly, support and guidance from the more than 55 practicing chief information security officers that make up SVCI.

article thumbnail

What is in Your SOC?

Security Boulevard

Except for a few “off-the-books” emergency budget requests to cover things cybersecurity insurance claims the provider did not pay, the CISO and CIO pretty much know how many “swords” they have to work with to support 24x7x365 security monitoring and operations. What is in Your SOC?

article thumbnail

Threat Modeling Should Be A Team Sport

Security Boulevard

Create an inventory of all components and data and map them to architecture. Architectural or infrastructure changes. CISO Suite Governance, Risk & Compliance Security Bloggers Network Cybersecurity Hacking pen-testing-companies risk management Threat Modeling

article thumbnail

5 Application Security Standards You Should Know

Security Boulevard

The ASVS lists 14 controls: Architecture, design, and threat modeling. Additionally, the ASVS notes it can be applied to the following use cases: Security architecture guide. Apply secure design principles in application architectures. Here is your compliance shortlist (yay!).

article thumbnail

BrandPost: 3 Best Practices for Building Security Resilience

CSO Magazine

That’s not surprising, given the rapidly increasing volume of endpoints distributed across complex IT architectures. We don’t secure everything, everywhere, or otherwise business wouldn’t get done,” said Helen Patton, CISO, Cisco Security Business Group.

CSO 63
article thumbnail

The Security Startup Ecosystem and the Trends Cisco is Watching

Cisco Retail

Today, the Cisco Investments team released their 2021 CISO Survival Guide to Emerging Trends in the Startup Ecosystem. There is a wealth of insightful information for CISOs in this report. Data access control is the #1 priority for CISOs in privacy and compliance.

Retail 107
article thumbnail

ConnectWise Quietly Patches Flaw That Helps Phishers

Krebs on Security

” However, LastPass maintains that its “customer passwords remain safely encrypted due to LastPass’s Zero Knowledge architecture.” ET: Included statement from ConnectWise CISO.

article thumbnail

The Quest for Optimal Security

The Falcon's View

However, listing out specific technologies can become cumbersome, plus it doesn't necessarily lend itself well to thinking about security architecture and strategy. infosec architecture behavior culture infosec management optimal program risk security strategyThere's no shortage of guidance available today about how to structure, build, and run a security program.

CISO 40
article thumbnail

Cybersecurity Culture: How Princeton University's Security Team Created It

SecureWorld News

Sherry brought to Princeton his 25 years of technology experience, 12 of which was in higher education as the former CISO at Brown University. Sherry explained that he (the CISO) would have no operational responsibilities in the beginning to focus solely on the execution of the mission.

CSO 53
article thumbnail

New SDP 2.0 specification facilitates zero-trust maturity

CSO Magazine

SDP ties closely to the pursuit of implementing a zero-trust architecture, and what follows are the key aspects of SDP 2.0 in zero-trust environments that CISOs and other security leaders need to know.

CISO 81
article thumbnail

A lasting trend: As a Service

CyberSecurity Insiders

Today the role of a Chief Information Security Officer (CISO) within organizations has become transformational where the CISO leads cross-functional teams to match the speed and boldness of digital transformations with agile, forward-thinking security and privacy strategies, investments, and plans.

CISO 100
article thumbnail

RSAC insights: Security platforms arise to help companies discover, assess and mitigate cyber risks

The Last Watchdog

Pity the poor CISO at any enterprise you care to name. As their organizations migrate deeper into an intensively interconnected digital ecosystem, CISOs must deal with cyber attacks raining down on all fronts. The overarching theme is to help CISOs gain a clear view of all cyber assets, be able to wisely triage exposures and then also become proficient at swiftly mitigating inevitable breaches. Related: The rise of ‘XDR’.

article thumbnail

Ransomware Resiliency for Storage & Backup: Trends, Threats & Tips

CyberSecurity Insiders

A few years ago, very few CISOs thought that storage & backups were important. This has driven CISOs to look again at potential holes in their safety nets, by reviewing their storage, backup and recovery strategies. “In Data is a major part of the role of any CISO.

Backups 105
article thumbnail

GUEST ESSAY: In pursuit of smarter cybersecurity — to overcome complex risks and grow revenue

The Last Watchdog

When it comes down to it, C-level goals and CISO initiatives are not all that misaligned. The need for reset and oversight is so great that a new class of technology is emerging to give organizations a better grip on the digital sprawl that’s come to define modern-day enterprise architecture. In golf there’s a popular saying: play the course, not your opponent. Related: How ‘CAASM’ closes gaps. In an enterprise, it’s the same rule.

Risk 147
article thumbnail

Wallarm adds Cybersecurity Leaders to its Board of Advisors

CyberSecurity Insiders

Wallarm’s newly announced Advisory Board members include: Mike Wilkes is a CISO who has built, transformed and protected companies such as SecurityScorecard, ASCAP, Marvel, AQR Capital, ING Bank, Rabobank, CME Group, Sony, and Macy’s.

CISO 52
article thumbnail

How to drive a successful, proactive tech refresh

Cisco Retail

And one can safely assume that very few CISOs are so flush with team members that they are hunting for something for them to do! Figure 1: Effect of IT architecture traits on tech refresh performance. Help implement consolidated, cloud-based architectures.

Retail 98
article thumbnail

What to look for in a vCISO as a service

CyberSecurity Insiders

“Approximately 64% of global CISOs were hired from another company” according to the 2021 MH Global CISO Research Report. Businesses will want to align their CISO requirements with the skillset and background of the candidate vCISO.

article thumbnail

2023 Cybersecurity Predictions from Marcus Fowler, Darktrace

CyberSecurity Insiders

A look ahead to 2023 we can expect to see changes in MFA, continued Hactivism from non-state actors, CISOs lean in on more proactive security and crypto-jackers will get more savvy. 5 – Recession requires CISOs to get frank with the board about proactive security.

Insurance 101
article thumbnail

GUEST ESSAY: 5 tips for ‘de-risking’ work scenarios that require accessing personal data

The Last Watchdog

Planning required processes and security components when initially building your architecture. About the essayist: Alexey Kessenikh is CISO at Soveren , which supplies automated detection and remediation solutions to manage personal data protection and compliance risks. Working with personal data in today’s cyber threat landscape is inherently risky. Related: The dangers of normalizing encryption for government use.

Risk 165
article thumbnail

Cloud Security Podcast?—?Two Years Later or Our Year-End Reflections for 2022!

Security Boulevard

We seem to have removed the curse of AI  — namely that our first 2 episodes on securing AI ( “EP52 Securing AI with DeepMind CISO” and “EP68 How We Attack AI? More “CISO meets cloud” episodes are planned as well! Cloud security for CISOs.

article thumbnail

Are WE the firewall?

CyberSecurity Insiders

Isn't security something we should all be thinking about, not just the CISOs? Instead, identifying a lead such as a CISO, CIO, or security director and inspiring an organization-wide, strategically aligned program would promote the most significant outcome.

article thumbnail

Inversion6 CTO Christopher Prewitt Named a Crain’s Cleveland Notable Executive in Technology

CyberSecurity Insiders

He excels in designing and optimizing cutting-edge enterprise security systems and data center architectures. “We’re Rather than operating as consultants at arms-length, Inversion6’s CISOs function as an integrated and ongoing part of a customer’s team.

CISO 52
article thumbnail

Beyond Identity Receives FIDO2 Certification

CyberSecurity Insiders

Harnessing the power of FIDO in our platform enables us to make passkeys universally available, simplifying the deployment of phishing-resistant MFA for CISOs and their teams.”. Universal passkey architecture that supports all major browsers, devices, and application combinations.

article thumbnail

A Reactive Cybersecurity Strategy Is No Strategy at All

CyberSecurity Insiders

A foundational approach to cybersecurity empowers CISOs to see abnormalities and block threats before they do damage. CISOs will be glad to hear that these solutions layer into a company’s existing security infrastructure quickly, enhancing the value of previous security investments.

DNS 114
article thumbnail

ROUNDTABLE: Kaseya hack exacerbates worrisome supply-chain, ransomware exposures

The Last Watchdog

Here’s what they had to say, edited for clarity and length: Vikram Asnani, senior director – solution architecture, CyberGRX. Chris Clements, VP of solutions architecture, Cerberus Sentinel. Gary Phipps, VP of solution architecture, CyberGRX. Bill Lawrence, CISO, SecurityGate.io. Tom Garrubba, CISO, Shared Assessments.

Hacking 203
article thumbnail

Appgate Awarded Cybersecurity Blanket Purchase Agreement by U.S. Department of Defense Enterprise Software Initiative

CyberSecurity Insiders

We are committed to help agencies fight against mounting cyberthreats and accelerate their Zero Trust journeys as mandated by the Office of Management and Budget,” said Leo Taddeo, CISO, Appgate and President, Appgate Federal. “We

article thumbnail

2022 (ISC)² Member Bloggers

CyberSecurity Insiders

Tips from a CISO: How to Create a Security Program. Effective Security Using Zero Trust Architecture. The success of our membership-driven organization is closely linked to the effort that each certification holder puts into the organization.

article thumbnail

IoT Devices a Huge Risk to Enterprises

eSecurity Planet

It also feeds into the larger argument for adopting a zero-trust architecture , a methodology that essentially assumes that no user or devices trying to connect to the network can be trusted until they’re authenticated and verified.

IoT 103
article thumbnail

SECURE London stokes debate on the future of the cybersecurity workforce

CyberSecurity Insiders

Schwarzenberger looked at everyday use cases and live demonstrations to compare the security architectures and features across AWS, GCP and Azure.

CISO 94
article thumbnail

5 Benefits of Hiring a Virtual Chief Information Security Officer (vCISO)

Security Boulevard

But hiring a full-time chief information security officer (CISO) is not always possible for organizations – nor is it always needed. Read on to learn why you might want to consider a virtual CISO (vCISO), and the benefits that come with that decision. by Tom Neclerio and Keith Gosselin.

CISO 56
article thumbnail

MITRE ResilienCyCon: You Will Be Breached So Be Ready

eSecurity Planet

JupiterOne CISO Sounil Yu, creator of a Cyber Defense Matrix adopted by OWASP, noted the concentration of security products in protection and detection and wondered, “Is our industry actually solving the right problems?”

CISO 81