Remove CISO Remove CSO Remove Firewall
article thumbnail

A CISO's Guide to a Good Night's Sleep

SecureWorld News

It is a common feeling in the cybersecurity community that CISOs do not sleep well at night. CISOs worry about the latest incident, end of life technology in their environment, breaches in the news, insecure users and vendors, penetration testing results, budget and resources, and the latest vulnerability report (to name a few).

CISO 100
article thumbnail

Cyber threat intelligence programs: Still crazy after all these years

CSO Magazine

When I asked CISOs about their cyber threat intelligence (CTI) programs about five years ago, I got two distinct responses. For these organizations, threat intelligence programs were nothing more than blocking indicators of compromise (IoCs) with firewalls, endpoint security software, email gateways, or web proxies.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Vulnerabilities don’t count

CSO Magazine

I had a lovely chat with one of my favorite CISOs the other day, helping them think through the security metrics that they report upwards. Disclosure: I used to be CISO at Akamai.] At best, they are a measurement of activity , not of effectiveness. To read this article in full, please click here

CISO 101
article thumbnail

Cybersecurity Snapshot: CISA’s Best Cyber Advice on Securing Cloud, OT, Apps and More

Security Boulevard

For more information about the threat from nation-state cyber attackers: What CISOs Need to Know About Nation-State Actors (InformationWeek) 4 Ways to Defend Against Nation-State Attacks (BankInfoSecurity) Growing Nation-State Alliances Increase U.S. Tenable was one of the 68 original signatories of the pledge.

article thumbnail

Cyber Security Awareness and Risk Management

Spinone

Always keep your eyes open to control-rights of the senior IT managers or systems administrators with the authority to configure servers, firewalls, cloud storage, and file-sharing (or another network privilege).

article thumbnail

ROUNDTABLE: Kaseya hack exacerbates worrisome supply-chain, ransomware exposures

The Last Watchdog

Dom Glavach, CSO and chief strategist, CyberSN. Bill Lawrence, CISO, SecurityGate.io. VPNs, firewalls, email gateways have all been misused recently to gain a foothold with privilege inside an organization’s network without having to phish a user or hope for open RDP to compromise. Tom Garrubba, CISO, Shared Assessments.