article thumbnail

7 Habits of a Highly Effective CISO: 2019 Data Security Resolutions

Thales Cloud Protection & Licensing

Unfortunately, with every possibility a new security risk appears, and as a CISO you are well-aware of the implications. and other countries coming on soon), being out of compliance becomes a huge and costly risk. As a result, many CISOs will need to put compliance high on the priority list in 2019.

CISO 72
article thumbnail

CISO’s 2023 Planning Guide for ERP Applications

Security Boulevard

Despite their importance, security teams often lack complete visibility into their ERP threat landscape and are unable to understand the true risk caused by undetected vulnerabilities and obfuscated suspicious activity. Forrester also recommended that CISOs channel investment in operational technology (OT) threat intelligence.

CISO 59
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Protecting your Customers and Brand in 2022: Are you doing enough?

Jane Frankland

Nowadays, organisations need digital leaders such as CIOs, CISOs, and CTOs who are strategists, visionaries, and know how to manage, effectively. The pressure for those in charge is immense as cyber risks have scaled, and can now bring businesses, economies, and communities to a halt. billion) is expected online.

CISO 130
article thumbnail

Security Affairs newsletter Round 452 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs

INC RANSOM ransomware gang claims to have breached Xerox Corp Spotify music converter TuneFab puts users at risk Cyber attacks hit the Assembly of the Republic of Albania and telecom company One Albania Russia-linked APT28 used new malware in a recent phishing campaign Clash of Clans gamers at risk while using third-party app New Version of Meduza (..)

article thumbnail

National Day of Unplugging – how switching off can boost business security

Thales Cloud Protection & Licensing

In my family, we regularly ‘unplug’ and use the opportunity to discuss cyber awareness and topics such as the risks to our family information, how we can improve personal safety, and what are we doing to prevent identify theft. Before implementing any long-term security strategy, CISOs must first conduct a data sweep.

article thumbnail

Data security is everyone’s responsibility

Thales Cloud Protection & Licensing

We’ve also addressed what key executives, especially CISOs, should be thinking about as data moves and is accessed across their organizations. While we have an appreciation for the risks enterprises face overall, security concerns are crucial for all. Now, we turn our attention to best practices for data security.

article thumbnail

Securing Containers for GDPR Compliance

Thales Cloud Protection & Licensing

Nearly one-quarter (24%) of the respondents to the 2018 Thales Data Threat Report (DTR) survey 1 indicate they already are using containers in production. My purpose here is to provide guidance on how enterprises that are using, or are planning to deploy, container technology can ensure these are secured for compliance.