Remove Architecture Remove CISO Remove Network Security Remove Technology
article thumbnail

New SEI CERT chief and first ever federal CISO: old cybersecurity models have ‘been overcome’

SC Magazine

We’ve been trying to do that for years and as new technologies come into play, that modernization and optimization is critically important. Trying to maintain computational and algorithmic advantage, we want to make sure that not only are we being secure by design, but we want to make sure that the whole ecosystem is properly addressed.

CISO 109
article thumbnail

How to drive a successful, proactive tech refresh

Cisco Security

One of the five main findings in our newly published Security Outcomes Study, Volume 2 , was the clear benefit in having a proactive strategy of refreshing business-critical technologies. How often should a technology refresh take place? As you could guess, this level of technology debt is a drag on security teams.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Security Startup Ecosystem and the Trends Cisco is Watching

Cisco Security

Today, the Cisco Investments team released their 2021 CISO Survival Guide to Emerging Trends in the Startup Ecosystem. Written in partnership with three leading VCs, this report breaks down trends in four areas of the security startup arena: Secure Access Service Edge (SASE), DevSecOps, Privacy & Compliance, and Automation.

CISO 112
article thumbnail

Is Your Security Stack and Legacy Tech Keeping Pace With Your Business?

CyberSecurity Insiders

By Tyler Farrar, CISO, Exabeam. In almost every case, technology has played a vital role in facilitating and supporting these changes. It makes sense that security budgets should follow to help protect these increasingly diverse and flexible architectures. Unfortunately, so were cyber adversaries. Leaving The Legacy.

article thumbnail

Could this 'Unhackable' Chip Be a Security Moonshot?

SecureWorld News

Before you do either of those things—again—consider this: a new computer chip remains unhacked after DARPA and more than 500 cybersecurity researchers tried to break through its security. The name might have tipped you off to a key feature; it morphs before attackers can figure out how to crack the chip's security.

CISO 123
article thumbnail

MY TAKE: As network perimeters shift and ecosystems blend, the role of MSSPs solidifies

The Last Watchdog

I had the chance to discuss this with Shinichi Yokohama, NTT Global CISO and John Petrie, Counselor to the NTT Global CISO, at RSA Conference 2023. We discussed how the boundaries between in-company and out-of-company IT infrastructure have become increasingly blurred making network security more challenging than ever.

CISO 244
article thumbnail

What is in Your SOC?

Security Boulevard

Except for a few “off-the-books” emergency budget requests to cover things cybersecurity insurance claims the provider did not pay, the CISO and CIO pretty much know how many “swords” they have to work with to support 24x7x365 security monitoring and operations. SOAR automation expertise supporting an adaptive security architecture.

Risk 98