Remove Article Remove CSO Remove Cyber threats Remove Cybersecurity
article thumbnail

North Dakota turns to AI to boost effectiveness and efficiency of its cybersecurity

CSO Magazine

The recent proliferation of tools that employ artificial intelligence (AI) or machine learning (ML) to perform human-like tasks has sparked a great deal of interest in the cybersecurity community. To read this article in full, please click here

article thumbnail

Attributes of a mature cyber-threat intelligence program

CSO Magazine

Earlier this year, ESG published a research report focused on how enterprise organizations use threat intelligence as part of their overall cybersecurity strategy. The research project included a survey of 380 cybersecurity professionals working at enterprise organizations (i.e., To read this article in full, please click here

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Threat intelligence programs poised for growth

CSO Magazine

In my last CSO article , I detailed cybersecurity professionals’ opinions on the characteristics of a mature cyber-threat intelligence (CTI) program. To read this article in full, please click here

CSO 105
article thumbnail

5 cyber threats retailers are facing — and how they’re fighting back

CSO Magazine

They earn and handle tremendous amounts of money, store millions of customer credit card numbers, and have frontline staff who may lack cybersecurity training. To read this article in full, please click here

Retail 117
article thumbnail

BrandPost: How resilient is your cybersecurity posture?

CSO Magazine

How prepared is your organization for today’s cyber threats? A survey of 6,700 private sector cybersecurity leaders finds that only 15% can be classified as having a mature readiness posture. What about tomorrow’s? If you’re uncertain or leaning negative, you’re far from alone.

article thumbnail

BrandPost: IT's New Cyber Threat Landscape

CSO Magazine

As ransomware and DDoS attacks have become events that every business needs to guard against, our cybersecurity solutions have evolved to protect your organization from the latest threat actors. To read this article in full, please click here

article thumbnail

7 tips for better CISO-CFO relationships

CSO Magazine

Every chief security executive knows that one of the most important—and perhaps challenging—aspects of the job is getting the funding needed to support the cybersecurity program. Sign up for CSO newsletters. ]. “The To read this article in full, please click here

CISO 137