Remove CISO Remove Firewall Remove Information Security Remove Network Security
article thumbnail

Years overdue, the profile of the CISO begins to rise as cyber grabs attention in boardrooms

SC Magazine

Executives from security company Kaspersky speak at a global partner conference about information security is a key business success factor – a reality that is starting to shine a brighter spotlight on security chiefs. Ian Gavan/Getty Images for Kaspersky Lab ). Our profile is certainly getting higher.

CISO 115
article thumbnail

Water utility CISO offers tips to stay secure as IT and OT converge

SC Magazine

Kristin Sanders, CISO for the Albuquerque Bernalillo County Water Utility Authority, revealed how New Mexico’s largest water and wastewater utility has been addressing the security challenge. The same philosophy applies to ABCWUA’s installation of its cloud-based enterprise network security software.

CISO 82
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New SEI CERT chief and first ever federal CISO: old cybersecurity models have ‘been overcome’

SC Magazine

Gregory Touhill, former federal chief information security officer and deputy assistant Homeland Security secretary for cyber security operations, seen here at a House Foreign Affairs Committee hearing in 2015 in Washington, DC. chief information security officer. Photo by Mark Wilson/Getty Images).

CISO 109
article thumbnail

Firms with exposed IoT have a higher concentration of other security problems

SC Magazine

For example, companies with exposed IoT are more than 50% more likely to have email security issues, according to a new report and blog post from the Cyentia Institute and RiskRecon. But what does that correlation mean for chief information security officers? So, how can CISOs operationalize that kind of information?

IoT 98
article thumbnail

IoT Devices a Huge Risk to Enterprises

eSecurity Planet

The increasingly distributed nature of IT – with data and applications living in and being accessed through the cloud, outside of traditional data centers protected by firewalls and antivirus software – is helping to fuel the zero-trust push, which states that identity is key. ” Most Devices Communicate in Plaintext.

IoT 145
article thumbnail

Common IT Security Roles and Responsibilities Explained

Spinone

To automate your job and remain time-efficient, you’ll probably need specialized software that helps you with app security assessment and whitelisting/blacklisting. Network Security Engineer As the name suggests, a network security engineer’s job is to protect corporate networks from data breaches, human error, or cyberattacks.

article thumbnail

Threat intel is a game changer, if only firms can figure out how to bake it into cyber programs

SC Magazine

Alyssa Miller, business information security officer at S&P Global Ratings, told SC Media that organizations who build out their programs from scratch tend to first stumble in two areas that underpin most threat intelligence programs: asset discovery and log management. Starting from scratch.