This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
It is a common feeling in the cybersecurity community that CISOs do not sleep well at night. CISOs worry about the latest incident, end of life technology in their environment, breaches in the news, insecure users and vendors, penetration testing results, budget and resources, and the latest vulnerability report (to name a few).
When I asked CISOs about their cyber threat intelligence (CTI) programs about five years ago, I got two distinct responses. For these organizations, threat intelligence programs were nothing more than blocking indicators of compromise (IoCs) with firewalls, endpoint security software, email gateways, or web proxies.
I had a lovely chat with one of my favorite CISOs the other day, helping them think through the security metrics that they report upwards. Disclosure: I used to be CISO at Akamai.] At best, they are a measurement of activity , not of effectiveness. To read this article in full, please click here
For more information about the threat from nation-state cyber attackers: What CISOs Need to Know About Nation-State Actors (InformationWeek) 4 Ways to Defend Against Nation-State Attacks (BankInfoSecurity) Growing Nation-State Alliances Increase U.S. Tenable was one of the 68 original signatories of the pledge.
Always keep your eyes open to control-rights of the senior IT managers or systems administrators with the authority to configure servers, firewalls, cloud storage, and file-sharing (or another network privilege).
Dom Glavach, CSO and chief strategist, CyberSN. Bill Lawrence, CISO, SecurityGate.io. VPNs, firewalls, email gateways have all been misused recently to gain a foothold with privilege inside an organization’s network without having to phish a user or hope for open RDP to compromise. Tom Garrubba, CISO, Shared Assessments.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content