This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
KrebsOnSecurity reviewed the Web sites for the global top 100 companies by market value, and found just five percent of top 100 firms listed a chief information security officer (CISO) or chief security officer (CSO). Not that these roles are somehow more or less important than that of a CISO/CSO within the organization.
A review of the executives pages published by the 2022 list of Fortune 100 companies found only four — BestBuy , Cigna , Coca-Cola , and Walmart — that listed a Chief Security Officer (CSO) or Chief Information Security Officer (CISO) in their highest corporate ranks. Nor is the average pay hugely different among all these roles.
Do you feel like you are gaining in your ability to protect your data and your network? If you are like 80% of respondents to the Trend Micro’s biannual Cyber Risk Index (CRI) report, you expect to experience a databreach that compromises customer data in the next 12 months.
T-Mobile has confirmed a databreach that impacted nearly 50 million people, including current, former and prospective subscribers. The exposed details differed across different types of customers, so the level of risk users are exposed to varies. To read this article in full, please click here
“Government-led cybersecurity initiatives are critical to addressing cybersecurity issues such as destructive attacks, massive databreaches, poor security posture, and attacks on critical infrastructure,” Steve Turner, security and risk analyst at Forrester, tells CSO.
With an ever-increasing number of cybersecurity threats and attacks, companies are becoming motivated to protect their businesses and customer data both technically and financially. million — more than twice the global average of $4.35 The global cyber insurance market was valued at $13.33 billion in 2023 to $84.62 billion by 2030.
From a cybersecurity standpoint, organizations are operating in a high-risk world. The ability to assess and manage risk has perhaps never been more important. When it isn’t, organizations will likely find themselves the target of a databreach or ransomware attack, or be vulnerable to any number of other security issues.”
Employment screening company DISA says data of 3.3 million people was exposed in a databreach lasts year, prompting AppOmni CSO Cory Michal to say that data collection companies like DISA and National Public Data need more oversight, regulations, and penalties.
Since then, we've witnessed a wide range of attacks: Stuxnet destroyed almost a fifth of Iran's nuclear centrifuges, WannaCry infected computers in 150 countries, ransomware gangs stole millions of US dollars, and thousands of companies have been affected by databreaches.
Jay” Abdullah , Mastercards Deputy CSO who gave a keynote address at The CSA Summit from Cloud Security Alliance at RSAC 2025. Similarly, identity emerged as RSACs dominant theme, fueled by Verizons latest DataBreach Investigations Report showing credential abuse remains a top attack vector.
Imagine your company experienced a major databreach, but instead of notifying the appropriate parties and taking necessary actions, you were instructed to keep it quiet! was also leading the list in terms of the percentage of respondents who claimed they'd been told to keep a breach concealed (71%).
Third-party risk rises as a factor in breaches: Verizon DBIR 2025 Verizons latest annual DataBreach Investigations Report (DBIR) shows some concerning trends with a sharp escalation in global cyber threats. Verizon itself noted a recurring theme of the role that third-party relationships play in breaches.
By spearheading cybersecurity programs, CISOs empower organizations to fend off cyber threats from criminal enterprises, insider risks, hackers, and other malicious entities that pose significant risks to operations, critical infrastructure, and even national security. RELATED: Uber CSO Found Guilty: The Sky Is Not Falling.
“It took nearly 11 months (328 days) to identity and contain databreaches resulting from stolen or compromised credentials.” – IBM’s Cost of DataBreach Report 2023 I recently came across a 2012 article from CSO Online , and realized that it has been more than 11 years since the phrase “Identity is the new perimeter” was coined!
Attack dates against Teqtivity and Uber have yet to be established; however, a threat actor named "UberLeaks" began leaking the stolen data on BreachForums, a site infamous for posting databreaches, around early Saturday morning, according to BleepingComputer. UberLeaks claimed the data came from Uber and Uber Eats.
Uber has suffered yet another databreach after a third-party law firm's servers were attacked. The law firm, Genova Burns, which provides legal counsel to Uber, has notified an unknown number of its drivers that sensitive data has been exposed and stolen due to a cyberattack.
AI-based cyber risk management SaaS vendor SAFE Security has announced the release Cyber Risk Cloud of Cloud – a new offering it claims uses generative AI to help businesses predict and prevent cyber breaches. This enables organizations to make informed, prognostic security decisions to reduce risk, SAFE Security said.
Seasoned CISOs/CSOs understand the importance of effectively communicating cyber risk and the need for investment in cybersecurity defense to the board of directors. One key aspect of successful communication is understanding the business objectives and risk appetite of the organization.
With databreach rates rising and criminal attack methods becoming more sophisticated each day, it is essential for every organization to take security seriously. Even if a company employs a Chief Information Security Officer (CISO) or Chief Security Officer (CSO), the position may still report to the CIO. Policy and Compliance.
That’s how they’re going to transfer data in, hopefully, a secure channel to pass information back and forth with each other.”. However, APIs are also more frequently the source of databreaches and other cyber incidents. No one really knows exactly how many APIs are out there. And that’s just one phone. Postal Service.
Companies should consider qualitative factors beyond just financial impacts when assessing an incident's materiality, such as reputational harm, litigation risks, and regulatory scrutiny. And the recent clarifications—focusing on material cybersecurity incidents—is a step in the right direction," said Glenn Kapetansky , CSO, Trexin Group. "In
CSI), followed by databreaches (23%), ransomware (20%) and a breach at a third party (15%). It was cited by 29% of respondents in a survey by Computer Systems Inc.
Cybersecurity risk assessment company Safe Security on Tuesday rolled out two new online risk assessment tools for businesses to use, in order to help them understand their vulnerability to cyberattacks and the costs of insuring against them. Risk tools measure financial impact of cyberthreats.
Risks and challenges in SaaS security monitoring. Using SaaS offerings such as Microsoft 365 to conduct important business carries risk. Early detection of identity compromise can prevent a small-scale compromise from becoming a large-scale databreach. To read this article in full, please click here
Whether a company utilizes a private, hybrid or public cloud infrastructure or offers cloud services to others, it is critical that each cloud instance and service be isolated to help minimize the risk of data compromise. However, to effectively isolate cloud instances, technologies like micro-segmentation are needed.
cybersecurity M&A deals hit 151 in the first three quarters of 2021, compared to 80, 88 and 94 in 2018, 2019 and 2020, respectively, according to data from 451 Research. According to CSO, 2021 shaped up to be an active year for mergers and acquisitions in the cybersecurity industry. It is all about risks.
Conversely, if a CISO is to be held accountable in the same manner as a CFO or General Counsel concerning matters of investor confidence, the executive contours of the CISO role should be revisited to ensure that it has sufficient authority, agency, and institutional backing to defend data assets as a fiduciary."
According to recent research over 60 percent of survey participants stated their executives are only “somewhat” or “not at all” informed about the information security risk and threats their organizations face. ” In an age where databreaches crowd the daily headlines, lack of awareness is no longer an excuse for executives.
Ransomware and databreaches pose a massive risk to organizations, resulting in loss of customer trust and shareholder value, reputation damage, hefty fines, and penalties. Cyber risk is a top concern in US corporate boardrooms, elevating the role of the chief information security officer to rapid prominence.
It can also lead to new vulnerabilities to cyberthreats, especially due to the surge in internet and digital network use, which has caused increased databreaches and higher security risks. To read this article in full, please click here
Nearly half of CISOs will change jobs by 2025 due to stress caused by the risk of being breached while trying to retain staff, according to the Gartner report, Predicts 2023: Cybersecurity Industry Focuses on the Human Deal. To read this article in full, please click here
Organizations with cloud workloads need to protect themselves against a variety of risks. While most organizations focus on security against attackers, breaches resulting from simple misconfigurations can be just as commonplace. To read this article in full, please click here
Under the guidance of Dan Meacham, VP of Global Security and Corporate Operations and CSO/CISO, the multi-billion dollar organization transitioned from on-premises data centers to the cloud in 2012. Unacceptable levels of risk. Risk reduction through contextual entitlements. Banishing Shadow IT.
Equifax is sharing its Security Controls Framework to anyone who wants it as a pay-it-forward for lessons learned from its 2017 databreach in which attackers exfiltrated hundreds of millions of customer records from the credit reporting agency. "We into our security transformation.
In March, the company disclosed a databreach that exposed about 1.2% In the last 6 months alone, we’ve seen over 17,000 open-source packages with malicious code risk. There’s also the problem of company employees using sensitive data with generative AI systems. The key is getting ahead of the risks.”
Expectations around how corporate America responds to and communicates around databreaches has evolved significantly over the past two decades,” said T.J. When a databreach is discovered, the heat is on the IS/IT department(s) and, in many organizations, there is a culture of blame,” said Winick. Here is a sampling.
According to IBM, the average cost of a databreach rose 10% to almost $5 million in 2024, but the true damage lies in downtime, reputational damages and regulatory fines, particularly in cloud-heavy industries.
Credential-driven databreaches are the biggest threat vector for most companies. Cybercriminals are prioritizing stolen credentials for use in attacks, with weak credentials significant contributors to cloud security risks.
Odds are more than one was breached here,” said Davisson. “I It’s best practice to keep a different set of credentials for each device because of exactly this risk.”. You can enable root access, but you have to jump through a lot of security hoops just to activate it,” noted Terry Dunlap, CSO and co-founder at ReFirm Labs.
If you are a US public company, there are additional board requirements from the Securities and Exchange Commission that you should be familiar with such as requiring written disclosure of how the board administers its risk oversight function. It is not only the CISO, CSO or CIO’s responsibility to care and do the right thing.
Jamil Farshchi, who cleaned up a databreach at Home Depot, was tapped by Equifax as CISO after its own breach. It also says he’ll be responsible for security compliance, internal audits, IT operations, risk measurement and remediation efforts, and the promotion of the company’s Secure by Design initiative.
In the last year, the state has seen a cyberattack take out the top regulatory agency, a databreach compromise the personal information of thousands of applicants for children’s health insurance, and a cyberattack that resulted in confidential information of 58,000 unemployment applicants being stolen, including SSNs and bank information.
Data protection and privacy developments Local and international news takes the stage here. There have been 5,105 databreaches involving Irish Government departments since GDPR came into force in 2018. MORE Cybersecurity and risk spending look set to increase in 2024, Gartner forecasts.
Security isn't a moral issue but simple cost vs. benefits, risk vs. rewards. Taking risks is more often the correct answer rather than having more security. It doesn't matter that this costs a lot of money due to databreaches. We have this flawed view that cybersecurity is a moral imperative, that it's an aim by itself.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content