This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Security and Exchange Commission (SEC) recently laid down the hammer charging and fining four prominent cybersecurity vendors for making misleading claims in connection with the SolarWinds hack. This enforcement has already had an impact on the sensitivity of CISOs managing their individual obligations.
Meanwhile, while business logic hacks, supply chain holes, and cyber extortion continue to loom large. Attackers arent hacking in theyre logging in. Well see CISOs increasingly demand answers about why models flag certain malicious activity and how that activity is impactful at enterprise scale. The hard part?
When data breaches escalate, cyber-attacks grow more sophisticated, nation states ramp up their digital warfare, and regulations tighten the noose, staying ahead isnt just an optionits your only line of defence. Amid a backdrop of increasingly sophisticated and frequent cyberattacks, APTs are a growing concern for CISOs and cyberrisk owners.
In a LinkedIn post today, June 26th, Jamil Farshchi, EVP and CISO at Equifax, had this to say about the news: "This is a really big deal. It's unprecedented: this is likely the first time a CISO has ever received one of these. So it seems odd for a CISO to get one of these," he wrote. federal securities laws."
Given the connectivity needs of a remote workforce – and knowing a hybrid workforce is here to stay – many IT teams have had to make sudden changes in the way workers connect to corporate systems that could introduce new cyberrisks and vulnerabilities. . Cloud dominance . Security landscape requires adaptation .
Cyberrisk remains top of mind for business leaders A regular January fixture, the World Economic Forums Global Risk Report 2025 features two technology-related threats among the top five risks for the year ahead and beyond. The report ranks risks by severity over two-year and 10-year timeframes.
The hack of Words with Friends in 2019 was high-profile, but today’s columnist, Yuval Elddad of CYE, says CISOs at all gaming companies have to take a closer look at the growing threats to online gaming platforms. The last thing players want to think about when they log onto their favorite game are cyber-risks.
This hack served as a stark reminder that the supply chain remains a critical vulnerability in enterprise security. The SEC cyber regulations will also drive strategic shifts in security teams. These questions—and their legal implications—will be a forcing function for cyber and corporate alignment.
Related: Preparing for ‘quantum’ hacks That being so, a new book, Fixing American Cybersecurity , could be a long overdue stake in the ground. Part one of the book catalogues how cyber criminals and US adversaries have taken full advantage of systemic flaws in how we’ve come to defend business and government networks.
Related Stories Spotlight: When Ransomware Comes Calling Episode 227: What’s Fueling Cyber Attacks on Agriculture ? Spotlight: Operationalizing MDR with Pondurance CISO Dustin Hutchison. government’s newest agency and the tip of the spear for government response to cyberrisks and cyber threats, CISA has its hands full.
A look ahead to 2023 we can expect to see changes in MFA, continued Hactivism from non-state actors, CISOs lean in on more proactive security and crypto-jackers will get more savvy. 5 – Recession requires CISOs to get frank with the board about proactive security. By Marcus Fowler, CEO of Darktrace Federal.
Our latest research into consumer behaviour has unearthed a conundrum: people knowingly take risks online even though they understand the dangers. On the one hand, we’ve got two out of three saying life is riskier now than it was five years ago, with serious concerns about losing data or being hacked. How do you know?
Capital One’s announcement of a hack that affected more than 100 million people should have you asking not what, but who’s in your wallet. Getting cyber wrong is expensive. Getting cyber wrong–i.e., Tortoises have cyber down pat, both for real and metaphorically. Bob, you’re fired. Attacks happen.
Those who had the opportunity to attend this year's conference heard some amazing keynote sessions, starting with the opener on Day 1 of the event by Andrew Smeation, CISO for Afiniti. Our second keynote of Day 1 was given by the eccentric Chris Roberts, CISO of Boom Supersonic.
Highly experienced cybersecurity experts, experienced personnel with a cyberrisk management background, and professional engineers who understand physical infrastructure are in huge demand. Maintaining these critical resources directly impacts the organization’s risk scoring. What is the role of the CIO and CISO in ESG?
BOSTON–( BUSINESS WIRE )– CyberSaint , the developer of the leading platform delivering cyberrisk automation, today announced that the company is seeking speaker submissions for its virtual STRONGER conference, set to occur September 13th-15th 2022. InfoSec 360. appeared first on Cybersecurity Insiders.
Check out invaluable cloud security insights and recommendations from the “Tenable Cloud Risk Report 2024.” Plus, a PwC study says increased collaboration between CISOs and fellow CxOs boosts cyber resilience. Meanwhile, a report finds the top cyber skills gaps are in cloud security and AI.
Intel 471 CISO Brandon Hoffman joins us to to discuss Darkside, the ransomware group that attacked the Colonial Pipeline, why the crew may have bitten off more than it can chew and what the attack says about the state of America's Critical Infrastructure. ” -Brandon Hoffman, CISO Intel 471. . Read the whole entry. »
2 - CISOs will turn to multi-cloud security platforms When it comes to the cloud, enterprises are increasingly wary of putting all their eggs in one basket. In 2025, CISOs will be challenged to strike a balance between driving forward technological adoption and ensuring the security and resilience of these tools.
As cyber threats evolve, so too must the GRC tools and strategies used to combat them. Organizations increasingly turn to automated, integrated, and AI-powered solutions to enhance their cyberrisk management capabilities. This shift requires continuous upskilling and a more integrated approach to risk and compliance.
In this Spotlight Podcast, host Paul Roberts talks with Chris Walcutt, the CSO of DirectDefense about the rising cyber threats facing operational technology (OT) and how organizations that manage OT - including critical infrastructure owners can best manage increased cyberrisks to OT environments. For Hacking.
You can start building your career in cybersecurity with CEH (Certified Ethical Hacking), eJPT (eLearning Junior Penetration Tester), and then OSCP (Offensive Security Certified Professional). Cybersecurity features several high-paying specializations, including ethical hacking, security architecture, and incident response.
. » Related Stories Project Airbreak: Hacking Medical Devices to Save Lives in a Pandemic Episode 182: Hackers take Medical Devices ‘off label’ to Save Lives Spotlight Podcast: Public Sector levels up to tackle Cyber Threats Episode 179: CISO Eye on the Virus Guy – Assessing COVID’s CyberRisks.
“Where we might have previously relied on what was provided in a short, written application, today we regularly have hour-long underwriting calls with clients, often speaking with their CISOs and security teams, to understand their risk and what security protocols they have in place.”. AI, ML Playing a Role.
Awareness and interest in cybersecurity is up Thanks to media attention due to hacks and data breaches plus campaigns and initiatives run by governments, tech giants, system integrators, cybersecurity consultancies and product vendors, more people than ever are interested in cybersecurity. Here’s my answer. #1.
It is vital for any enterprise landscape to ensure viable, open, and reliable corporate communications – fostering innovation and economic prosperity, with respect to safeguarding against disruption and serious cyberrisk perception. What are the benefits of cyber security awareness trainings?
Chris Walcutt, the CSO at DirectDefense talks about the rapidly changing threat landscape that critical infrastructure owners and operators inhabit, and how savvy firms are managing OT cyberrisks. The post Spotlight Podcast: OT Is Under Attack. appeared first on The Security Ledger with Paul F. Click the icon below to listen.
A group of investors filed the suit which specifically calls out SolarWinds, its former CEO, and also Tim Brown, who is VP of Security and CISO. This week, SolarWinds fired back on the lawsuit's claims and accusations as it defended its CISO and its own cybersecurity actions in court. Summary of SolarWinds response to investor lawsuit.
“All of this means cyberrisk continues to escalate and that CISOs need to be just as nimble and methodical as the adversary.”. “With an economic downturn on the horizon, CISOs are making sure they are investing in the most effective tools to maximize cyber ROI. More Metaverse Means More Hacking.
And now CISOs and security teams are getting some surprise mainstream exposure from comedians as they turn cyber headlines into security punchlines. It is helping raise greater security and cyberrisk awareness within organizations, with everyone from end-users to board members. No, way—no I'm not gonna stop hacking.
Creeping cyberrisk grabbing global headlines Ransomware keeps reminding us of the strong connection between a cybersecurity incident and financial loss. Links we liked Say it with a headline: “We hacked Google A.I. MORE Jane Frankland argues that making CISOs into heroes isn’t helpful. for $50,000.” trillion problem.
While cybersecurity has its bad side (breaches, hacks, AI); it also has a good side (good practitioners and vendors fighting the good fight, AI). Preparing for Q-Day in 2025 should be a top priority for CISOs for this very reason. Death, taxes, and cybersecurity. Growing patchwork of U.S.
That headache is real, of course, but accountants and lawyers will step up to sort it out," said Mike Wilkes , Former CISO, MLS; Adjunct Professor, NYU. Thinking a bit more widely, though, I can imagine there will be a concomitant rise in cyber espionage and attacks between groups of impacted groups in China and the U.S.
Additionally, expect to see more disclosures to regulators from hacking groups, like the one by ALPHV/BlackCat to the SEC in November 2023. As these regulations scale, expect to see more legal cases and fines on companies and CISOs particularly from the SEC, like the SolarWinds and CISCO, Tim Brown, case.
It cites cyber incidents such as the 2021 Oldsmar water treatment facility hack as examples of real-world risks. Kip Boyle , vCISO, CyberRisk Opportunities LLC, said he worries the EPA's actions do not go far enough.
In this blog, I’m exploring these changes, grouped under key categories that I’ve used in previous years, to help business leaders and cyberrisk owners better prepare for the evolving landscape. The emergence of shadow AIunauthorised AI tools used without IT approvalamplifies these vulnerabilities.
Rogers made his remarks as part of a panel discussion on securing digital transformation moderated by Infosys CISO Vishal Salvi. Here are a few key takeaways I came away with: Rising cyber exposures Enterprises today are engaged in a struggle to balance security and agility. It was a wide-ranging, eye-opening discussion.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content