This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
The modern enterprise C-suite is undergoing a seismic shift—not over profits or market share, but over who leads technology, shapes strategy, and ultimately defines the future of the business. The digital era has brought with it not just new technologies, but new power dynamics. Duplicated technologies inflate costs.
Related: Technology and justice systems The U.S. Security and Exchange Commission (SEC) recently laid down the hammer charging and fining four prominent cybersecurity vendors for making misleading claims in connection with the SolarWinds hack. Some have moved away from the CISO role.
Related: A call to regulate facial recognition That said, a few dozen CISOs attending Black Hat USA 2023 will get to experience, hands-on, what it must have been like to be in the crucible of milestone hacks like Capital One, SolarWinds and Colonial Pipeline. San Diego or New York City , feel free to skip ahead.
Meanwhile, while business logic hacks, supply chain holes, and cyber extortion continue to loom large. Attackers arent hacking in theyre logging in. Well see CISOs increasingly demand answers about why models flag certain malicious activity and how that activity is impactful at enterprise scale. The drivers are intensifying.
There’s often a lot of debate as to what the best security or hacking movie is. The movie starts on the outskirts of a jungle and the CISO (Arnie) with his team land in their helicopters. This is a perfect metaphor for how a CISO operates in day to day situations. This shows how quickly a CISO can get burnt out on the job.
Technologies that were figments of the imagination a dozen years ago, if they were conceived of at all, quickly become mainstream — think generative artificial intelligence (GenAI) or blockchain. As they do, they create more security vulnerabilities and inherent business, changing the nature of cybersecurity careers.
A review of the executives pages published by the 2022 list of Fortune 100 companies found only four — BestBuy , Cigna , Coca-Cola , and Walmart — that listed a Chief Security Officer (CSO) or Chief Information Security Officer (CISO) in their highest corporate ranks. Nor is the average pay hugely different among all these roles.
Securities and Exchange Commission (SEC) announced Tuesday that it has fined four companies $7 million for misleading statements about their cybersecurity incidents, particularly concerning the high-profile 2019 SolarWinds hack. Check Point Software Technologies Ltd., Check Point Software Technologies Ltd. Unisys Corp.,
The details of the Krispy Kreme hack are still emerging, but the companys Form 8-K filing brought the incident to light, offering a rare glimpse into the challenges businesses face when their systems are compromised. The Krispy Kreme hack is a sobering reminder that no industry is immune to cyber threats.
Insights from our new Advisory CISO, Helen Patton. If there’s anyone who’s been put through their paces in the security industry, it’s Helen Patton , our new Advisory Chief Information Security Officer (CISO). Helen has come to Cisco from The Ohio State University, where she served as CISO for approximately eight years.
As defenders of digital assets, Chief Information Security Officers (CISOs) and cybersecurity professionals face immense pressure, often leading to burnout. It also cites the emergence of recent technologies, and the proliferation of criminal groups, as issues increasing pressure on staff.
It is a common feeling in the cybersecurity community that CISOs do not sleep well at night. CISOs worry about the latest incident, end of life technology in their environment, breaches in the news, insecure users and vendors, penetration testing results, budget and resources, and the latest vulnerability report (to name a few).
But as a CISO or cyber risk owner, it’s not just about locking down sensitive informationits about doing it without slowing down your people. Amid a backdrop of increasingly sophisticated and frequent cyberattacks, APTs are a growing concern for CISOs and cyber risk owners.
In a LinkedIn post today, June 26th, Jamil Farshchi, EVP and CISO at Equifax, had this to say about the news: "This is a really big deal. It's unprecedented: this is likely the first time a CISO has ever received one of these. So it seems odd for a CISO to get one of these," he wrote. federal securities laws."
Ira Winkler, CISO at Skyline Technology Solutions, recounts his amazing journey from wannabe astronaut to NSA intelligence analyst, social engineer, systems hacker and author, and some of the crazy things that happened along the way - check it out. The post CISO Stories Podcast: So You Want to be a Cyber Spy?
As CISOs embark on their transformational journeys, identifying these areas of weakness should be the top priority. This has led to CISOs shifting how they approach protecting the corporate perimeter with additional controls and monitoring tools being used to scan any access to the network. Cloud dominance .
Pondurance CISO Dustin Hutchison joins me to talk about how companies can operationalize MDR within their environment. The post Spotlight: Operationalizing MDR with Pondurance CISO Dustin Hutchison appeared first on The Security Ledger with Paul F. Dustin Hutchison is CISO at Pondurance. Click the icon below to listen.
it's WAY easier to hack minds than networks. What if we thought like a psychologist, not just a CISO? Especially upon the emergence of exponential technologies of the Metaverse and Neuro-technologies (like Neuralink) that is transcending the very nature of cyber and cognitive attacks. The solution?
Truth, transparency and trust are the three T’s that all CISOs and CSOs should embrace as they march through their daily grind of keeping their enterprise and the data safe and secure. Failure to adhere to the three T’s can have serious consequences.
Pondurance CISO Dustin Hutchison joins me to talk about how companies can operationalize MDR within their environment. The post Spotlight: Operationalizing MDR with Pondurance CISO Dustin Hutchinson appeared first on The Security Ledger with Paul F. Dustin Hutchinson is CISO at Pondurance. Click the icon below to listen.
For all the discussion around the sophisticated technology, strategies, and tactics hackers use to infiltrate networks, sometimes the simplest attack method can do the most damage. The recent Unitronics hack , in which attackers took control over a Pennsylvania water authority and other entities, is a good example.
CISOs report a growing focus on managing AI-generated vulnerabilities and addressing insider threats amplified by the misuse of advanced AI tools. Workforce challenges persist, with states finding it difficult to hire and retain professionals who understand AI technologies and their security implications.
I had the opportunity to sit down with DigiCert’s Jason Sabin , Chief Technology Officer and Avesta Hojjati , Vice President of Engineering to chew this over. And PKI is the best technology we’ve got to get us there. We met at DigiCert Trust Summit 2023. Threat actors are pursuing a “harvest now, decrypt later” strategy, Savin told me.
We are unsure what the rest of 2021 has in store, but the most successful CISOs will be the ones ensuring security teams have access to the latest intel and tools to be prepared for emerging threats. The SolarWinds hack brought the need for federal mandates on third-party vendors and suppliers to light in an unprecedented way.
Tyler Technologies, the U.S.’s ’s largest provider of software and services to the public sector said on Wednesday that it was hacked by unknown assailants, who gained “unauthorized access” to the company’s IT and phone systems. Read the whole entry. » Read the whole entry. »
The new normal CISOs face today is something of a nightmare. Criminal hacking collectives are thriving, more than ever. We can plug in parts or all of a complete stack of cutting-edge security technologies, and provide the expertise an organization requires to operate securely in today’s environment.”.
We’ve been trying to do that for years and as new technologies come into play, that modernization and optimization is critically important. We’ve seen the speed and cadence of hacking groups increase substantially over the past two years. We’ve seen the speed and cadence of hacking groups increase substantially over the past two years.
Moreover, adding new technologies and tools to a SOC without proper integration can create siloed systems. Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini ( SecurityAffairs hacking, SOC) Most modern SOCs already receive thousands of alerts, stretching analysts to capacity.
For years, in articles, lectures, and books I have discussed how the spread of IoT and AI technologies – both individually and together – are dramatically increasing the danger to human life posed by cyberattacks on healthcare facilities. The firm has also expanded into cybersecurity systems for aircraft. Axis Security.
Daines co-sponsored a bill for DHS to research using hacking as a response to an incident. A bipartisan bill introduced last week would have the Department of Homeland Security research what most in cybersecurity refer to as “hacking back”: the use of offensive hacking as part of network defense or incident response.
Related: Business logic hacks plague websites. Here are three things automated cybersecurity technology does exceptionally well: •Tackle mundane tasks. Automated cybersecurity technology and tools are now doing much of the heavy lifting to keep organizations secure. The larger question: Can cybersecurity be truly automated?
We find many CISOs spend their time explaining what threats matter and why, as opposed to why cybersecurity matters in the first place,” he says. Tried-and-true hacking techniques continue to be highly effective at flushing out soft spots in legacy network defenses, even highly layered security systems. 19 on a hacking forum.
Citrix CISO, Fermin J. Johannes Ullrich, the head of research at the SANS Technology Institute, confirmed that one of its honeypots set up to capture attacks attempting to exploit the recently disclosed flaw in the F5 Networks’ BIG-IP systems was targeted by hackers attempting to exploit two of the recent Citrix vulnerabilities.
Tom Badders, senior product manager for secure mobility products and services at Telos Corporation, added that CIOs and CISOs need to prioritize technology and information assets and segment them by criticality and/or special use case.
When Steve Katz was named chief information security officer of Citibank in 1995, he was given two directives: build the best information security department in the world and limit the damage from the 1994 hack of the bank’s funds transfer system. Listen to episode 6 of CISO Stories, Your Job is to Make CyberSecurity Simple!
Zero-trust - whatever that means to the presenter and audience; Cloud - meaning Azure, specifically; DevOps and DevSecOps - whatever those terms mean ; MS threat intelligence including artificial intelligence/machine learning rapid responses to novel malware (a cool idea, provided it works reliably).
Meanwhile, security teams are also concerned about recent cybersecurity issues including MS Exchange vulnerabilities and the SolarWinds hack. There’s a growing need to secure the perimeter while simplifying the technologies that do so. Mature technologies are combined with cutting-edge innovation to meet newer and desirable outcomes.
In fact, according to a recent report by Skybox Security, 73% of CIOs and CISOs are “highly confident” they will not suffer an operational technology breach in the next 12 months. The post Here’s Why Critical Infrastructure Keeps Getting Hacked appeared first on SecureLink. But, in just the past year, 83% […].
The role of the Chief Information Officer has undergone significant transformations over the past few decades, driven by the rapid advancements in technology. Chief should mean something," said Patrick Benoit , Global CISO for Brinks and member of the SecureWorld Houston Advisory Council. "I That is a huge conflict of interest.
The IT Security Guru caught up with Tarnveer Singh a CISO and finalist in the Security Serious Unsung Heroes Awards 2023 for his thoughts on how to get more professionals involved in the cybersecurity industry: There are many ways we can inspire new cybersecurity professionals to join our industry. We must reduce barriers to entry.
Brazil’s Superior Court of Justice was hit by a ransomware attack on Tuesday during judgment sessions, the attack forced a temporary shut down of the court’s information technology network. ” reads the CISO Advisor. SecurityAffairs – hacking, ransomware). Pierluigi Paganini.
Cyber risk remains top of mind for business leaders A regular January fixture, the World Economic Forums Global Risk Report 2025 features two technology-related threats among the top five risks for the year ahead and beyond. MORE eBays CISO shares his thoughts on planning and security ROI.
Scattered Spider is a well-known, sophisticated cybercriminal group mostly known for hacking the casino operators MGM Resorts International and Caesars Entertainment. To defend against this group, secure privileged accounts, implement phishing-resistant MFA, and verify every help desk identity request," said Chad Cragle , CISO at Deepwatch.
Session Title: Balancing The Tug of War: How CIOs and CISOs Can Partner for Better IT. Speakers: McAfee CIO Scott Howitt, and CISO Arve Kjoelen. The rapid evolution of the digital world has driven great technology innovation and spawned growth in cyberthreats that range from the annoying to the catastrophic.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content