Remove CISO Remove Cybersecurity Remove Network Security Remove Penetration Testing
article thumbnail

NetSPI Lands $410 Million in Funding – And Other Notable Cybersecurity Deals

eSecurity Planet

NetSPI, a top penetration testing and vulnerability management company, recently announced a $410 million funding round, a huge amount in a year in which $100+ million rounds have become a rarity. According to data from Crunchbase , the total amount of investments in cybersecurity startups came to $2.6

article thumbnail

New SEC Cybersecurity Rules Could Affect Private Companies Too

eSecurity Planet

Securities and Exchange Commission (SEC) strongly advised public companies to improve their cybersecurity. However, after minimal corporate adoption of stronger cybersecurity, the SEC has drafted rules to require more formal cybersecurity reporting and disclosure. Also read: What is Cybersecurity Risk Management?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Red Team vs Blue Team vs Purple Team: Differences Explained

eSecurity Planet

Red, blue and purple teams simulate cyberattacks and incident responses to test an organization’s cybersecurity readiness. Blue team members might be led by a chief information security officer (CISO) or director of security operations, making this team the largest among the three.

article thumbnail

Common IT Security Roles and Responsibilities Explained

Spinone

IT security is one of the most fast-paced industries in the world. million unfilled cybersecurity jobs by 2021. There is clearly a demand for skilled security professionals. So let’s take a look at some of the most common IT security roles and what it takes to fit into them. An estimation shows that there will be 3.5

article thumbnail

NYDFS Cybersecurity Regulations: Key Deadlines

NopSec

The first traditional deadline is coming to a close this month for compliance with the NYDFS Cybersecurity Regulations. Keep in mind that at this point, all documentation and information related to your cybersecurity program must be made available to the superintendent upon request. Appointing a CISO (section 500.4(a))

article thumbnail

Businesses Secretly Pentest Partners as Supply Chain Fears Grow

eSecurity Planet

Partner organizations, after all, may be reluctant — if unlikely — to admit to cybersecurity weaknesses. Howard Taylor, CISO of Radware, goes so far as to call it the “death of trust.” The process may include an in-depth search for IP addresses and ports inside their networks that may be communicating with suspect hosts.

Insurance 116
article thumbnail

External Attack Surface Management: How Focusing on Basics Improves Security

Security Boulevard

External attack surface management (EASM) has become a vital strategy for improving cybersecurity, particularly amid recession fears that have stressed the business landscape across several sectors for many months.