Remove Article Remove CSO Remove Technology
article thumbnail

Exposure Management Works When the CIO and CSO Are in Sync

Security Boulevard

In this post, Tenable CIO Patricia Grant looks at how the CIO/CSO relationship is key to a successful exposure management program. When I first joined Tenable, one of the first things I did was sit down with our CSO, Robert Huber , to align on how we were going to work together. So, my advice to fellow CIOs: Stay close to your CSO.

CSO 52
article thumbnail

The CSO role today: Responsibilities and requirements for the top security job

CSO Magazine

CSO definition. A CSO is a departmental leader responsible for information security, corporate security or both. That's the simplest answer to the question "What is a CSO?", At many companies, the term CSO is still used in this way. To read this article in full, please click here

CSO 116
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CSO's ultimate guide to security and privacy laws, regulations, and compliance

CSO Magazine

CSO's ultimate guide to security and privacy laws, regulations, and compliance Security and privacy laws, regulations, and compliance: The complete guide This directory includes laws, regulations and industry guidelines with significant security and privacy impact and requirements. To read this article in full, please click here

CSO 128
article thumbnail

Recent shadow IT related incidents present lessons to CISOs

CSO Magazine

Sign up for CSO newsletters. ]. Operating within an enclaved system means direct user access to more advanced technologies from their workstations wasn’t happening. They do have the challenge of employees using technology and applications with capabilities that far outstrip their ability to keep up.

CISO 144
article thumbnail

11 technologies improving database security

CSO Magazine

Now, sophisticated tools and technologies are making it possible for database developers to have their cake and, to stay in metaphor, not count the calories by keeping the information private. To read this article in full, please click here (Insider Story)

article thumbnail

Why CISO roles require business and technology savvy

CSO Magazine

This was a few years ago, and one can only guess that the role had been created by a technologist who didn’t care about or didn’t understand the business—or, inversely by a businessperson who didn’t understand enough about technology. To read this article in full, please click here In either case, the disconnect is real.

CISO 125
article thumbnail

New Intel CPU-level threat detection capabilities target ransomware

CSO Magazine

Keep up on the latest thought leadership, insights, how-to, and analysis on IT security through CSO Online’s newsletters. ]. These include things like trusted execution, virtualization, memory encryption, runtime BIOS resilience and threat detection technology ( Intel TDT ). To read this article in full, please click here