This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Even among top tech firms, less than half list a chief technology officer (CTO). KrebsOnSecurity reviewed the Web sites for the global top 100 companies by market value, and found just five percent of top 100 firms listed a chief information security officer (CISO) or chief security officer (CSO). Not anymore.
A review of the executives pages published by the 2022 list of Fortune 100 companies found only four — BestBuy , Cigna , Coca-Cola , and Walmart — that listed a Chief Security Officer (CSO) or Chief Information Security Officer (CISO) in their highest corporate ranks. Nor is the average pay hugely different among all these roles.
This post is focused on stopping databreaches with SSE. This subject is critical because legacy data protection strategies and technologies no longer suffice in the modern business world. Our previous topic revolved around securing hybrid work. To read this article in full, please click here
Case in point: A federal judge recently ordered Uber Technologies to work with its former CSO, Joseph Sullivan (who held the position from April 2015 to November 2017), and review a plethora of Uber documents that Sullivan has requested in unredacted form for use in his defense in the upcoming criminal trial.
Third-party risk rises as a factor in breaches: Verizon DBIR 2025 Verizons latest annual DataBreach Investigations Report (DBIR) shows some concerning trends with a sharp escalation in global cyber threats. Landed earlier than usual, the 2025 edition found that 30 per cent of breaches involved third-parties, doubling from 2024.
Jay” Abdullah , Mastercards Deputy CSO who gave a keynote address at The CSA Summit from Cloud Security Alliance at RSAC 2025. Similarly, identity emerged as RSACs dominant theme, fueled by Verizons latest DataBreach Investigations Report showing credential abuse remains a top attack vector.
Paul speaks with Caleb Sima, the CSO of the online trading platform Robinhood, about his journey from teenage cybersecurity phenom and web security pioneer, to successful entrepreneur to an executive in the trenches of protecting high value financial services firms from cyberattacks. Caleb Sima is the CSO at Robinhood.
They now face the risk of being implicated in criminal investigations or held accountable for security breaches, as evidenced by cases like that of Joe Sullivan, the former Chief Security Officer of Uber, who was sentenced to three years' probation for covering up a databreach involving millions of Uber user records.
Concerns about the risks these new technologies could introduce range from the potential issues of sharing sensitive business information with advanced self-learning algorithms to malicious actors using them to significantly enhance attacks.
The problem is that many companies don't realize that using third-party APIs can expose their applications to security issues, such as malware, databreaches, and unauthorized access. Third-party APIs are software interfaces that allow organizations to leverage third-party functionality or data on their own websites or applications.
With databreach rates rising and criminal attack methods becoming more sophisticated each day, it is essential for every organization to take security seriously. Even if a company employs a Chief Information Security Officer (CISO) or Chief Security Officer (CSO), the position may still report to the CIO. Compliance Officer.
However, to effectively isolate cloud instances, technologies like micro-segmentation are needed. It can reduce the severity to a contained incident that can be remediated quickly versus an expansive databreach that spans multiple parts of the business, or numerous clients in a multi-tenant service.
cybersecurity M&A deals hit 151 in the first three quarters of 2021, compared to 80, 88 and 94 in 2018, 2019 and 2020, respectively, according to data from 451 Research. According to CSO, 2021 shaped up to be an active year for mergers and acquisitions in the cybersecurity industry. In fact, the volume of U.S.
Conversely, if a CISO is to be held accountable in the same manner as a CFO or General Counsel concerning matters of investor confidence, the executive contours of the CISO role should be revisited to ensure that it has sufficient authority, agency, and institutional backing to defend data assets as a fiduciary."
Developing a Clear Cybersecurity Strategy As a CISO/CSO, creating and presenting a clear cybersecurity strategy to the board of directors is crucial in fostering awareness of cyber risks and encouraging investment in cybersecurity defense. Vulnerability assessments highlighting areas where your organization’s defenses may be lacking.
These days, information technology (IT) and information security professionals know this all too well, especially when it comes to configuration assessments. The 2020 Verizon DataBreach Investigations Report (DBIR) notes that vulnerabilities accounted for nearly 20% of hacking breaches.
The release comes in the wake of the Verizon 2023 DataBreach Investigations Report , which cited phishing as the second most common way threat actors infiltrate organizations, behind stolen credentials.
Equifax is sharing its Security Controls Framework to anyone who wants it as a pay-it-forward for lessons learned from its 2017 databreach in which attackers exfiltrated hundreds of millions of customer records from the credit reporting agency. "We into our security transformation. My philosophy is always been about fundamentals.
According to thought leaders, the compromise of video data could result in intellectual property theft, physical security threats, privacy violations, extortion and perhaps regulatory punishment. Odds are more than one was breached here,” said Davisson. “I Look at the Mac operating system.
According to IBM, the average cost of a databreach rose 10% to almost $5 million in 2024, but the true damage lies in downtime, reputational damages and regulatory fines, particularly in cloud-heavy industries. However, this creates a challenge: the knowledge gap.
Nvidia confirmed it was the target of an intrusion and that the hackers took "employee passwords and some Nvidia proprietary information," but did not confirm the size of the databreach. What happened with the Nvidia databreach? To read this article in full, please click here
Under the guidance of Dan Meacham, VP of Global Security and Corporate Operations and CSO/CISO, the multi-billion dollar organization transitioned from on-premises data centers to the cloud in 2012. Data protection with user and entity behavior analytics (UEBA). Unacceptable levels of risk.
In the last year, the state has seen a cyberattack take out the top regulatory agency, a databreach compromise the personal information of thousands of applicants for children’s health insurance, and a cyberattack that resulted in confidential information of 58,000 unemployment applicants being stolen, including SSNs and bank information.
In March, the company disclosed a databreach that exposed about 1.2% Generative technologies like GPT-4 are exciting and they can drive value. ChatGPT Security Incidents GPT-4 is still in private beta, but if you have a paid subscription to ChatGPT, you will have access to the GPT-4 model. They’re also unavoidable.
Former Uber CSO Joe Sullivan was found guilty of obstructing a federal investigation in connection with the attempted cover-up of a 2016 hack at Uber, NIST and Microsoft say that mandatory password expiration is no longer needed but many organizations are still doing it, and how fake executive profiles are becoming a huge problem for […].
Jamil Farshchi, who cleaned up a databreach at Home Depot, was tapped by Equifax as CISO after its own breach. In its press release, Austin, Texas-based SolarWinds notes that Brown has “25 years of experience developing and implementing security technology” and “holds 18 issued patents on security-related topics.”
The collaboration is part of the Girl Scouts’ push to reduce the gender gap in technology via bringing 2.5 In this conversation, Liz and I talk about the collaboration with Girl Scouts of America as well as the challenge of teaching technology and cyber literacy to children and the. million girls into the STEM pipeline by 2025.
With this in mind, Last Watchdog sought commentary from technology thought leaders about what the CrowdStrike outage says about the state of digital resiliency. Implementing zero trust across the entirety of the technology stack would go a long way toward increasing resilience against events like this.
Brian Krebs is an independent investigative reporter known for his coverage of technology, malware , databreaches , and cybercrime developments. ICYMI, Equifax forced to pull offline a huge database of consumer data guarded only by credentials "admin/admin" [link] — briankrebs (@briankrebs) September 13, 2017.
"Every day, we collect terabytes of threat data coming in from honey pots, from submissions from our partners, from customers, from feedback loops, from a lot of our crawling technologies. Huawei USA's CSO answers questions about trust, verification, cybersecurity, and supply chain security. Can You Trust Huawei?
Examples of this include keeping software up to date, backing up data, and maintaining good password practices. At the end of the day, lack of education and human error are two of the largest contributors to databreaches. Unfortunately, cybercriminals know this and have engineered their technology to behave accordingly.
Cybersecurity is on the brink of significant transformation as we approach 2025, grappling with escalating complexities driven by advancements in technology, increasing geopolitical tensions, and the rapid adoption of AI and IoT. Ethics The ethical challenges posed by advancing AI technologies will demand urgent attention in 2025.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content