article thumbnail

Spotlight: Traceable CSO Richard Bird on Securing the API Economy

The Security Ledger

In this Spotlight episode of the Security Ledger podcast, I interview Richard Bird, the CSO of the firm Traceable AI about the challenge of securing application programming interfaces (APIs), which are increasingly being abused to steal sensitive data. Read the whole entry. » » Click the icon below to listen.

CSO 52
article thumbnail

Few Fortune 100 Firms List Security Pros in Their Executive Ranks

Krebs on Security

A review of the executives pages published by the 2022 list of Fortune 100 companies found only four — BestBuy , Cigna , Coca-Cola , and Walmart — that listed a Chief Security Officer (CSO) or Chief Information Security Officer (CISO) in their highest corporate ranks.

CSO 204
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

From Compliance to Resilience: Cyber Governance as the Cornerstone of CISO Strategy

SecureWorld News

The role of a Chief Information Security Officer (CISO) is undeniably complex, yet incredibly rewarding. Recent regulatory developments, such as the Securities and Exchange Commission's (SEC) new regulations in the United States, have further intensified the challenges for CISOs.

CISO 57
article thumbnail

How to Speak Information Security to Executives: A CSO Perspective

NopSec

According to recent research over 60 percent of survey participants stated their executives are only “somewhat” or “not at all” informed about the information security risk and threats their organizations face. In a meeting with my previous CFO, I was discussing the risk posture of the organization.

article thumbnail

11 cybersecurity buzzwords you should stop using right now

CSO Magazine

Used to simplify complex terminology or boost sales and marketing campaigns, buzzwords are an inescapable reality for an innovative and fast-paced industry like information security. However, such terms are not always helpful and can be inaccurate, outdated, misleading, or even risk causing harm. Sign up for CSO newsletters. ].

article thumbnail

Spotlight Podcast: Taking a Risk-Based Approach to Election Security

The Security Ledger

In this Spotlight Podcast, sponsored by RSA, we take on the question of securing the 2020 Presidential election. Given the magnitude of the problem, could taking a more risk-based approach to security pay off? In this Spotlight Podcast, sponsored by RSA, we take on the question of securing the 2020 Presidential election.

Risk 52
article thumbnail

4 ways to keep the cybersecurity conversation going after the crisis has passed

CSO Magazine

When leading information security for three previous companies, he remembers executives would call him during their morning train commutes after reading about the latest security breach, seeking reassurance. But nothing more than that.” [ Learn the 7 keys to better risk assessment. | Could this happen to us?

CSO 132