This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Avaya Holdings , Check Point Software Technologies , and Mimecast Limited each minimized or obscured the extent of security breaches linked to the SolarWinds Orion hack, impacting investor trust and highlighting the critical importance of clear, truthful communication. Some have moved away from the CISO role.
KrebsOnSecurity reviewed the Web sites for the global top 100 companies by market value, and found just five percent of top 100 firms listed a chief information security officer (CISO) or chief security officer (CSO). Nobody’s saying these companies don’t have CISOs and/or CSOs and CTOs in their employ.
Security's all-too-frequent appearance as a front-page headline making topic has put CISOs in the hot seat as CEOs and boards worry that it could be their names next in news stories trying to explain how a breach occurred. Yet the CISO message to the C-suite might not be all that reassuring.
SolarWinds Corporation, which suffered a major breach of its Orion software platform in December 2020, submitted a U.S. In a LinkedIn post today, June 26th, Jamil Farshchi, EVP and CISO at Equifax, had this to say about the news: "This is a really big deal. federal securities laws."
Many in mainstream media have characterized the DarkSide attack on Colonial Pipeline , which operates a significant portion of the nation’s critical energy infrastructure, as a wake-up call for CIOs and CISOs. Get the latest from CSO by signing up for our newsletters. ]. The first being, “a laissez-faire attitude toward cybersecurity.”
And now, you finally got that call, to be a CISO at an organization. Before diving into security strategies, CISOs need to invest time in understanding the organization's culture, strategic roadmaps, operational dynamics, industry, and so forth. Was there a previous CISO? You ' ve worked in the trenches.
CISOs have an array of ever-improving tools to help spot and stop malicious activity: network monitoring tools, virus scanners, software composition analysis (SCA) tools, digital forensics and incident response (DFIR) solutions, and more. Sign up for CSO newsletters. ].
It’s still early days, but if this year is anything like years past, it’s safe to say CISOs will have a lot to contend with, from a continuing labor shortage to the increasing sophistication of cyberattacks to an ongoing threat from nation-state actors. However, they also have plenty of ideas on how they’ll tackle those challenges.
It is a common feeling in the cybersecurity community that CISOs do not sleep well at night. CISOs worry about the latest incident, end of life technology in their environment, breaches in the news, insecure users and vendors, penetration testing results, budget and resources, and the latest vulnerability report (to name a few).
From the CISO perspective, a recent industry report from Coalfire on Software Supply Chain Risk hit the nail on the head: “Managing risk within software supply chains and product development lifecycles has become as important as protecting traditional, physical inventories and equipment supply lines.”
The attackers compromised their victims by injecting malicious code into the legitimate software updates for a popular network management platform developed by a company called SolarWinds. To read this article in full, please click here (Insider Story)
In a move that has raised concerns about the company's cybersecurity posture, Amy Bogac, Clorox's CISO, has stepped down from her position. For CISOs, the 'C' in the title designates a considerable degree of responsibility for material business value.
CISOs report a growing focus on managing AI-generated vulnerabilities and addressing insider threats amplified by the misuse of advanced AI tools. CISOs are working on improving collaboration with federal partners to share intelligence and best practices for AI threat management. Promote the CISO's role in digital transformation.
Late last year, a group believed to be Russia’s Cozy Bear (APT29) successfully compromised SolarWinds’ Orion update software , turning it into a delivery vehicle for malware. Nearly 100 customers of the popular network monitoring tool were affected, including government entities and cybersecurity company FireEye.
SolarWinds this week announced that its vice president of security Tim Brown has taken on the additional title of CISO, as part of the company’s ongoing efforts to institute a secure-by-design posture. (“ SolarWinds letters” by sfoskett at is licensed under CC BY-NC-SA 2.0 ). Hard to say. Only my paycheck.”.
The research was compiled by Cider Security along with experts from Netflix, Atlassian, Mozilla, Lemonade Insurance, Rapid7, Databricks, and the former CISOs of Twitter and LivePerson. CI/CD environments, processes, and systems are the beating heart of any modern software organization. You can access the full research report here. .
Bridge the Gap with Cisco: Best Practices for Balancing Productivity and Security Stolen credentials and unpatched software are common attack vectors used by cybercriminals in many types of attacks, including ransomware. Wendy will give the CISO perspective on how to build a sustainable, ongoing program using evidence-based practices.
While in past years, InfoSec was previously the focus and CISOs were the norm – we’re moving to a new cybersecurity world order that expands the role of the CISO to a CSO (Chief Security Officer). The transition from hybrid to a software-defined world. Ransomware becomes the most feared adversary.
When I asked CISOs about their cyber threat intelligence (CTI) programs about five years ago, I got two distinct responses. For these organizations, threat intelligence programs were nothing more than blocking indicators of compromise (IoCs) with firewalls, endpoint security software, email gateways, or web proxies.
Plus, a PwC study says increased collaboration between CISOs and fellow CxOs boosts cyber resilience. Less than 50% of respondents say their organizations’ CISOs are involved “to a large extent” with strategic planning, reporting to the board and overseeing tech deployments.
Check out best practices, recommendations and insights on protecting your cloud environments, OT systems, software development processes and more. Maintain a comprehensive asset inventory, and keep software updated and patched. SBOMs purpose is to provide granular visibility into all software components in your environment.
Plus, learn how CISOs and their teams add significant value to orgs major initiatives. CISOs who are involved early in cross-function decision-making generate more value than those who were consulted late or not at all, the report reads. Check out ETSIs new global standard for securing AI systems and models. Check out what they said.
Seasoned CISOs/CSOs understand the importance of effectively communicating cyber risk and the need for investment in cybersecurity defense to the board of directors. To ensure cybersecurity becomes a strategic part of the corporate culture, it is crucial for CISOs to present the topic in a clear, concise, and compelling manner.
Despite years of modernization initiatives, CISOs are still contending with an old-school problem: shadow IT, technology that operates within an enterprise but is not officially sanctioned — or on the radar of — the IT department.
The Cloud Security Alliance (CSA) recently published the Software-Defined Perimeter (SDP) 2.0 in zero-trust environments that CISOs and other security leaders need to know. in zero-trust environments that CISOs and other security leaders need to know. specification , which is created by their SDP and zero-trust working groups.
Security engineering teams are typically made up of software and infrastructure engineers, architects, and product managers. As security engineering teams continue to grow in prominence, CISOs need to be intentional with their structure and development. This presents a challenge to security leaders.
Hanson, the CISO and CIO of Code42, a cybersecurity software company, sees value in that outreach. When that happens, an analyst reaches out to the colleague to determine whether he or she violated any security rules and to confirm he or she understands the company’s cybersecurity best practices.
2 - CISOs will turn to multi-cloud security platforms When it comes to the cloud, enterprises are increasingly wary of putting all their eggs in one basket. In 2025, CISOs will be challenged to strike a balance between driving forward technological adoption and ensuring the security and resilience of these tools.
I contributed to this article by David Spark of CISO/Security Vendor Relationship Series. These are some of the best API security tips right now: 25 API Security Tips You’re Probably Not Considering.
The SolarWinds software that is used by thousands of federal government agencies and corporations in the US and aboard was hacked. But we can still make it hard for the hackers to get into the cores of software and hardware as SolarWinds did. Their software development process was also weak. Indications are that they did.
He is active in CIO Roundtables, CISO Chicago, the Chicago Life Sciences Consortium, and the Technology Leaders' Association. Fun fact: my six years as CSO of Trexin is my first official full-time security role! Glenn's certifications and memberships include IEEE, (ISC)2 (CISSP), ISACA (CISA), and ITIL (SM).
The software supply chain issues identified … in OpenAI’s breach are not surprising, as most organizations are struggling with these challenges, albeit perhaps less publicly,” said Peter Morgan, who is the co-founder and CSO of Phylum.io, a cybersecurity firm that focuses on the supply chain. “The
It was apropos that Ray Yepes, newly appointed CISO for the State of Colorado, opened the 2022 SecureWorld Denver conference on October 6th. Ray Yepes, CISO for the State of Colorado, presents the opening keynote. Down the hall, Brenden Smith, CISO at FirstBank, presented "Revisiting Deception Systems: Enterprise Use Cases."
.” “It would be possible, on detailed examination of video, to compromise elements of operational security,” agreed Mike Hamilton, co-founder and chief information security officer of CI Security and former Seattle CISO. Individual workers’ patterns and habits could be studied as well, to their detriment.
Most businesses have a mix of software from multiple vendors and in-house software. Simbian helps every member of the security team from the CISO to the frontline practitioner solve their unique security needs in real-time. Each business and each member of a security team have unique, ever-changing security needs.
A scan shows a total of five servers in China and 68 in the United States that apparently run the same Zoom server software as the Beijing server.". These quick actions earned praise from many CISOs around the world, who got what he was saying and were impressed with what he was doing.
With a career spanning two decades as a technology provider to businesses and government agencies, Levine brings a strategic and pragmatic approach to building secure software and cloud services without disrupting product velocity. Todd Bell serves as the chief information security officer and executive director at Valleywise Health.
They just haven’t been educated, so we really want to help educate people that are giving, that they may have talents or tools or resources or software or funding that really could help this larger ecosystem.”. But it really does. The letter also introduced the hashtags #CyberPhilanthropy and #ExpandCyberFunding.
Meanwhile, cybercriminals have amplified their use of malware for fake software-update attacks. CISA is warning about a spear-phishing campaign that spreads malicious RDP files. Plus, OWASP is offering guidance about deepfakes and AI security. And get the latest on CISA’s international plan, Interpol’s cyber crackdown and ransomware trends.
In August 2021, Dr James Ransome -- Veteran CISO, CSO, CPSO and Author -- hosted a fireside chat at FuzzCon 2021. Fagbemi of Resilient Software Security, and Jeff Costlow of Extrahop Networks to discuss the ins and outs of a successful security testing program. Contrary to popular belief the bottleneck is not finding new issues.
said Dan Meacham, vice president of global security and corporate operations and CSO/CISO at film production company Legendary Entertainment. Too many vendors think their software product will address all issues. After all, “if it’s not easy to do business with you, then why am I doing business with you?”
It is not only the CISO, CSO or CIO’s responsibility to care and do the right thing. Your company should keep up to date with the latest patches/updates for all hardware and software systems as well as utilize and enable the latest features in their security software. Everyone is responsible and accountable.
For instance, Winick cited a 2017 New York Post article that suggested credit rating company Equifax had blamed its software vendor for a major breach, “thus violating another crisis communications commandment of ‘Be accountable.’”
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content