This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Today, the Chief Technology Officer (CTO) and Chief Information Security Officer (CISO) are rising in prominence—fuelled by the accelerating demands of AI innovation, cybersecurity, and digital transformation. In it I’m going to examine each C-levels roles, the risks, and what needs to occur for today’s challenges to be met.
Security and Exchange Commission (SEC) recently laid down the hammer charging and fining four prominent cybersecurity vendors for making misleading claims in connection with the SolarWinds hack. But the SEC’s latest actions underscore that failing to inform stakeholders about material risks and breaches is not an option.
Meanwhile, while business logic hacks, supply chain holes, and cyber extortion continue to loom large. Businesses must adopt tools and automation capable of invoking immediate action, even at the risk of false positives. Raising security baselines across industries is essential, with risk mitigationnot acceptancebecoming the standard.
Related: A call to regulate facial recognition That said, a few dozen CISOs attending Black Hat USA 2023 will get to experience, hands-on, what it must have been like to be in the crucible of milestone hacks like Capital One, SolarWinds and Colonial Pipeline. San Diego or New York City , feel free to skip ahead.
There’s often a lot of debate as to what the best security or hacking movie is. The movie starts on the outskirts of a jungle and the CISO (Arnie) with his team land in their helicopters. This is a perfect metaphor for how a CISO operates in day to day situations. But they are all way way waaaaay off the mark.
But amidst all these flashy, futuristic threats, the biggest cybersecurity risk remains the same as it's always beenhumans. it's WAY easier to hack minds than networks. What if we thought like a psychologist, not just a CISO? And I'm not talking about the shadowy hackers in hoodies. The solution?
The post Sisense Hacked: CISA Warns Customers at Risk appeared first on Security Boulevard. A hard-coded credential catastrophe: The analytics firm kept big companies’ secrets in an insecure AWS bucket. Government says victims include the “critical infrastructure sector.”
Securities and Exchange Commission (SEC) announced Tuesday that it has fined four companies $7 million for misleading statements about their cybersecurity incidents, particularly concerning the high-profile 2019 SolarWinds hack. The SEC charged the companies with "materially misleading disclosures regarding cybersecurity risks and intrusions."
A review of the executives pages published by the 2022 list of Fortune 100 companies found only four — BestBuy , Cigna , Coca-Cola , and Walmart — that listed a Chief Security Officer (CSO) or Chief Information Security Officer (CISO) in their highest corporate ranks. Nor is the average pay hugely different among all these roles.
But as a CISO or cyber risk owner, it’s not just about locking down sensitive informationits about doing it without slowing down your people. It encompasses everything from ensuring the confidentiality and integrity of information to reducing risks, maintaining compliance, and building trust with customers.
The details of the Krispy Kreme hack are still emerging, but the companys Form 8-K filing brought the incident to light, offering a rare glimpse into the challenges businesses face when their systems are compromised. To mitigate such risks, organizations must adopt proactive measures.
The Securities and Exchange Commission (SEC) has announced charges against software company SolarWinds Corporation and its chief information security officer (CISO), Timothy G. Brown, for “fraud and internal control failures relating to allegedly known cybersecurity risks and vulnerabilities.”
Insights from our new Advisory CISO, Helen Patton. If there’s anyone who’s been put through their paces in the security industry, it’s Helen Patton , our new Advisory Chief Information Security Officer (CISO). Helen has come to Cisco from The Ohio State University, where she served as CISO for approximately eight years.
Evidence showed: NSO sold hacking packages for $ 7 million to European clients ( 15 device slots per deal). Third- party software risks extend beyond the supply chain to nation- state surveillance contractors. Third- party software risks extend beyond the supply chain to nation- state surveillance contractors.
As defenders of digital assets, Chief Information Security Officers (CISOs) and cybersecurity professionals face immense pressure, often leading to burnout. Key findings from the report include: 90% of CISOs are concerned about stress, fatigue, or burnout affecting their team's well-being.
The panel members’ engaging insights remain instructive to CISO s today as security leaders strive to hone their increasingly important board presentation approaches. Another board member stressed that she focused nearly all her attention during CISO presentations on the information pertaining to the security budget.
and its Chief CISO, Timothy G. The SEC accused SolarWinds of failing to adequately disclose cybersecurity risks and vulnerabilities, which allegedly misled investors about the company's security posture and internal controls. It emphasizes the importance of clear, accurate, and comprehensive risk factor disclosures.
Nearly half of CISOs will change jobs by 2025 due to stress caused by the risk of being breached while trying to retain staff, according to the Gartner report, Predicts 2023: Cybersecurity Industry Focuses on the Human Deal. This includes the knowledge that there are only two possible outcomes: get hacked or don’t.
That urgency was echoed powerfully in JPMorgan CISO Patrick Opets open letter to SaaS vendors. SaaS Is the New Enterprise Perimeter Weve long known our software supply chains carry risk. Among these are the North Korean IT workers hacks into U.S. We start by acknowledging the risk. That letter stuck with me.
It is a common feeling in the cybersecurity community that CISOs do not sleep well at night. CISOs worry about the latest incident, end of life technology in their environment, breaches in the news, insecure users and vendors, penetration testing results, budget and resources, and the latest vulnerability report (to name a few).
EC-Council : The International Council of E-Commerce Consultants, or EC-Council, offers several certifications for different career paths but is best known for its white-hat hacking program. Chief Information Security Officer (CISO) As Chief Information Security Officer, you’ve arrived at the C-Suite.
Given the connectivity needs of a remote workforce – and knowing a hybrid workforce is here to stay – many IT teams have had to make sudden changes in the way workers connect to corporate systems that could introduce new cyber risks and vulnerabilities. . Cloud dominance . Security landscape requires adaptation .
When Steve Katz was named chief information security officer of Citibank in 1995, he was given two directives: build the best information security department in the world and limit the damage from the 1994 hack of the bank’s funds transfer system. Listen to episode 6 of CISO Stories, Your Job is to Make CyberSecurity Simple!
In a LinkedIn post today, June 26th, Jamil Farshchi, EVP and CISO at Equifax, had this to say about the news: "This is a really big deal. It's unprecedented: this is likely the first time a CISO has ever received one of these. So it seems odd for a CISO to get one of these," he wrote. federal securities laws."
Cybersecurity risks increase every year and bludgeon victims who fail to prepare properly. For those interested in a better understanding of the oncoming risks, this is the information you are looking for. It can feel like crossing a major highway while blindfolded. Many never see the catastrophe about to happen, until it occurs.
Pondurance CISO Dustin Hutchison joins me to talk about how companies can operationalize MDR within their environment. The post Spotlight: Operationalizing MDR with Pondurance CISO Dustin Hutchison appeared first on The Security Ledger with Paul F. Dustin Hutchison is CISO at Pondurance. Click the icon below to listen.
Pondurance CISO Dustin Hutchison joins me to talk about how companies can operationalize MDR within their environment. The post Spotlight: Operationalizing MDR with Pondurance CISO Dustin Hutchinson appeared first on The Security Ledger with Paul F. Dustin Hutchinson is CISO at Pondurance. Click the icon below to listen.
The post GoDaddy Hosting Hacked — for FOURTH Time in 4 Years appeared first on Security Boulevard. GoDaddy’s web hosting service breached yet again. This time, the perps were redirecting legit websites to malware.
The post Mailchimp Hack Causes Theft of Trezor Crypto Wallet ‘Money’ appeared first on Security Boulevard. Hackers have stolen a mother lode of personal data from Intuit’s email marketing operation, Mailchimp.
Facebook parent Meta has disciplined or fired at least 25 workers for allegedly hacking into user accounts. Meta Security Guards Hacked Facebook Users appeared first on Security Boulevard. The post Oops!
The hack of Words with Friends in 2019 was high-profile, but today’s columnist, Yuval Elddad of CYE, says CISOs at all gaming companies have to take a closer look at the growing threats to online gaming platforms. Take a holistic approach, focusing on the real risks to business continuity and optimizing the cybersecurity investment.
Cyber risk remains top of mind for business leaders A regular January fixture, the World Economic Forums Global Risk Report 2025 features two technology-related threats among the top five risks for the year ahead and beyond. The report ranks risks by severity over two-year and 10-year timeframes.
Plus, learn why code-writing GenAI tools can put developers at risk of package-confusion attacks. Both frameworks have a Core section, which outlines detailed activities and outcomes aimed at helping organizations discuss risk management. Check out NISTs effort to further mesh its privacy and cyber frameworks.
CISOs report a growing focus on managing AI-generated vulnerabilities and addressing insider threats amplified by the misuse of advanced AI tools. CISOs are working on improving collaboration with federal partners to share intelligence and best practices for AI threat management. Promote the CISO's role in digital transformation.
We are unsure what the rest of 2021 has in store, but the most successful CISOs will be the ones ensuring security teams have access to the latest intel and tools to be prepared for emerging threats. The SolarWinds hack brought the need for federal mandates on third-party vendors and suppliers to light in an unprecedented way.
Identity credentials and source code are critical assets that can create major risks for your organization when exposed by breaches of third-party cloud service companies that provide identity management and software composition analysis. Know the risks of pushing your crown jewels into other services running in the cloud.
2023 Rewind — Cyber Trends and Threats The generative AI (r)evolution 2023 will be remembered as the year artificial intelligence (AI) rose to the forefront of our collective consciousness, ushering in never before seen opportunities and risks. A more mature third party risk management program. The solution?
The post New Russian Hacks Revealed—but U.S. Microsoft has issued another of its “look how clever we are” writeups of detecting APT29 hackers. But the U.S. government sees it differently. Says it’s Microsoft’s Fault appeared first on Security Boulevard.
Generally, though, the risk management and security arrangements quietly support and enable the business from the inside, as it were, rather than being exposed externally - unless they fail anyway! A glossy, nicely-constructed and detailed PowerPoint slide deck by Microsoft Security caught my beady this morning.
By engaging third-party experts to simulate real-world hacks, companies can proactively uncover potential weaknesses and address them promptly. By using real-time antivirus scanning to detect and neutralize security risks as they enter the trading system, threats can be quickly identified and eliminated.
Reddit got hacked with a “sophisticated” spear phishing attack. The post Reddit Hacked — 2FA is no Phishing Phix appeared first on Security Boulevard. The individual victim was an employee who clicked the wrong email link.
If T-Mobile doesn't address the root cause of these breaches, it risks not only damaging its reputation but also losing out on millions of dollars from customers. If you were the CISO of T-Mobile right now, what would you do? Curious about past T-Mobile incidents?
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content