article thumbnail

Episode 247: Into the AppSec Trenches with Robinhood CSO Caleb Sima

The Security Ledger

Paul speaks with Caleb Sima, the CSO of the online trading platform Robinhood, about his journey from teenage cybersecurity phenom and web security pioneer, to successful entrepreneur to an executive in the trenches of protecting high value financial services firms from cyberattacks. Caleb Sima is the CSO at Robinhood.

CSO 52
article thumbnail

Why authentication is still the CISO’s biggest headache

CSO Magazine

Authentication remains one of the most painstaking challenges faced by CISOs in organizations large and small. Authentication a significant obstacle for modern CISOs. Authentication continues to test CISOs for several reasons, with its modern definition being the first to address, Netskope CISO Lamont Orange tells CSO. “We

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Consumers are done with passwords, ready for more innovative authentication

CSO Magazine

CISOs looking to beef up their customer-facing authentication procedures to thwart cyberattacks need to walk a fine line. You want the method to provide tight security without being too complicated, confusing, or onerous for end users.

article thumbnail

Black Hat 2021: Better Than Ever (As Always)

Duo's Security Blog

In this session led by Cisco Secure CISO Josh Yavor, you’ll learn about best practices that Cisco implemented to enable secure access for a global remote workforce, providing the best experience for productivity without compromising on security. With so much to look forward to, we can’t wait for Black Hat to begin.

CISO 83
article thumbnail

10 most common MFA excuses, and how to answer them

CSO Magazine

My password is strong enough. A strong password is a crucial and applaudable first step, but as cyberattacks become more sophisticated, it isn’t sufficient by itself. This is a point that CISOs need to hammer home to users and managers by citing examples of security breaches where strong passwords were not enough.

CISO 94
article thumbnail

BrandPost: Don’t Make This Mistake on the Journey to Passwordless Security

CSO Magazine

Passwords have been used to gain access to computers since at least 1961, when an operating system at the Massachusetts Institute of Technology implemented the need for login credentials. Over the following decades, as threats have evolved, there have been seesaw-like reactions to adapting password tactics. “In

article thumbnail

GoDaddy WordPress data breach: A timeline

CSO Magazine

In a Securities and Exchange Commission (SEC) filing , Demetrius Comes, GoDaddy’s CISO, announced that the organization had discovered unauthorized access to its Managed WordPress servers. Using a compromised password, an unauthorized third party accessed the provisioning system in our legacy code base for Managed WordPress.”