Remove CISO Remove Firewall Remove Network Security Remove Risk
article thumbnail

How the CISO has adapted to protect the hybrid workforce

IT Security Guru

Given the connectivity needs of a remote workforce – and knowing a hybrid workforce is here to stay – many IT teams have had to make sudden changes in the way workers connect to corporate systems that could introduce new cyber risks and vulnerabilities. . Security landscape requires adaptation .

CISO 97
article thumbnail

GUEST ESSAY: Essential cyber hygiene practices all charities must embrace to protect their donors

The Last Watchdog

Assess risks. Creating a solid cybersecurity foundation begins with understanding the organization’s risks. A recent study found only 27% of charities undertook risk assessments in 2023 and only 11% said they reviewed risks posed by suppliers. Keep software updated. Strengthen authentication.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Water utility CISO offers tips to stay secure as IT and OT converge

SC Magazine

Kristin Sanders, CISO for the Albuquerque Bernalillo County Water Utility Authority, revealed how New Mexico’s largest water and wastewater utility has been addressing the security challenge. The same philosophy applies to ABCWUA’s installation of its cloud-based enterprise network security software.

CISO 82
article thumbnail

A Reactive Cybersecurity Strategy Is No Strategy at All

CyberSecurity Insiders

A foundational approach to cybersecurity empowers CISOs to see abnormalities and block threats before they do damage. But what are your options for proactive protection when the notion of a walled-in network has been shattered by the proliferation of new IoT devices, growth of cloud services, and new hybrid work from home models?

DNS 140
article thumbnail

New SEI CERT chief and first ever federal CISO: old cybersecurity models have ‘been overcome’

SC Magazine

But ultimately, what we’re trying to do is to reduce the risks to national security and national prosperity by hardening and strengthening that cyber ecosystem. That model has been overcome by things like [smartphones] and mobility and the firewalls are very difficult to configure and maintain. And that’s been overcome.

CISO 109
article thumbnail

DDoS Myths: Blackholing and Outsourcing Won’t Stop Everything

eSecurity Planet

Even organizations that think they’re protected against DDoS attacks may be more at risk than they think. When CISOs evaluate their IT infrastructure, they assign scoring priorities to different systems. However, there are risks associated with this approach. However, there are limitations to this strategy.

DDOS 97
article thumbnail

Gartner Security & Risk Management Summit 2018 Trip Report

Thales Cloud Protection & Licensing

Every June, Gartner hosts a terrific security conference near Washington, D.C. called Gartner Security & Risk Management Summit. This event is focused on the needs of senior IT and security professionals, such as CISOs, chief risk officers, architects, IAM and network security leaders.

Risk 59