CISO

An inside look at NetSPI’s impressive Breach and Attack Simulation platform

An inside look at NetSPI’s impressive Breach and Attack Simulation platform 19/09/2023 at 08:02 By Mirko Zorz In this Help Net Security interview, Scott Sutherland, VP of Research at NetSPI, delves into the intricacies of their Breach and Attack Simulation (BAS) platform and discusses how it offers unique features – from customizable procedures to advanced […]

React to this headline:

Loading spinner

An inside look at NetSPI’s impressive Breach and Attack Simulation platform Read More »

The hidden dangers of low-value data

The hidden dangers of low-value data 18/09/2023 at 08:05 By Help Net Security In this Help Net Security video, Terry Ray, SVP Data Security and Field CTO at Imperva, warns organizations to stop ignoring low-value data – as criminals use it as a place to live, watch, and wait for the perfect moment to steal

React to this headline:

Loading spinner

The hidden dangers of low-value data Read More »

Great security training is a real challenge

Great security training is a real challenge 14/09/2023 at 07:31 By Help Net Security All employees need security training, yet it’s generally a resented afterthought. A variety of studies over years show that human error is generally felt to be the largest vulnerability in organizations. For technology companies like SaaS providers, who also need to

React to this headline:

Loading spinner

Great security training is a real challenge Read More »

The critical role of authorization in safeguarding financial institutions

The critical role of authorization in safeguarding financial institutions 14/09/2023 at 07:01 By Help Net Security According to a recent Cost of Data Breach report, the financial industry has the second highest average cost for a data breach, making the value well worth financial institutions investing more into authorization. In this Help Net Security video,

React to this headline:

Loading spinner

The critical role of authorization in safeguarding financial institutions Read More »

CISOs and Board Reporting – an Ongoing Problem

CISOs and Board Reporting – an Ongoing Problem 13/09/2023 at 18:49 By Kevin Townsend Boards often complain they receive overly-technical reports from management teams that fail to put governance in business and financial terms. The post CISOs and Board Reporting – an Ongoing Problem appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

CISOs and Board Reporting – an Ongoing Problem Read More »

How should SMBs navigate the phishing minefield?

How should SMBs navigate the phishing minefield? 13/09/2023 at 07:47 By Zeljka Zorz In this Help Net Security interview, Pete Hoff, CISO at Wursta, offers advice to SMB security leaders and professionals on how to minimize the threat phishing presents to their organization’s operations and long-term success. What makes phishing attacks particularly challenging for small

React to this headline:

Loading spinner

How should SMBs navigate the phishing minefield? Read More »

CISOs need to be forceful to gain leverage in the boardroom

CISOs need to be forceful to gain leverage in the boardroom 12/09/2023 at 06:32 By Help Net Security Over 70% of CISOs feel that the importance of information security is not recognised by senior leadership, according to BSS. The CISOs said their top four highest investment priorities in 2023 are change management (35%), information security

React to this headline:

Loading spinner

CISOs need to be forceful to gain leverage in the boardroom Read More »

CISOs and board members work more closely than ever before

CISOs and board members work more closely than ever before 11/09/2023 at 08:31 By Help Net Security 73% of board members believe they face the risk of a major cyber attack in the next 12 months, a notable increase from 65% in 2022, according to Proofpoint. Likewise, 53% feel unprepared to cope with a targeted

React to this headline:

Loading spinner

CISOs and board members work more closely than ever before Read More »

The Team8 Foundry Method for Selecting Investable Startups

The Team8 Foundry Method for Selecting Investable Startups 07/09/2023 at 18:46 By Kevin Townsend Team8, a VC organization with added sauce, queried more than 130 CISOs from its own ‘CISO Village’ to discover the concerns of existing cybersecurity practitioners, and the technologies they are seeking for the future. The post The Team8 Foundry Method for

React to this headline:

Loading spinner

The Team8 Foundry Method for Selecting Investable Startups Read More »

Shifting left and right, innovating product security

Shifting left and right, innovating product security 07/09/2023 at 07:03 By Mirko Zorz In this Help Net Security interview, Slava Bronfman, CEO at Cybellum, discusses approaches for achieving product security throughout a device’s entire lifecycle, fostering collaboration across business units and product lines, ensuring transparency and security in the supply chain, and meeting regulatory requirements

React to this headline:

Loading spinner

Shifting left and right, innovating product security Read More »

Cyber talent gap solutions you need to know

Cyber talent gap solutions you need to know 06/09/2023 at 07:03 By Help Net Security 90% of consumers across the US and UK are concerned about cybersecurity’s future if students aren’t exposed to the field at an earlier age, according to ThreatX. 88% are worried that today’s talent shortage will negatively impact protection of their

React to this headline:

Loading spinner

Cyber talent gap solutions you need to know Read More »

ChatGPT on the chopping block as organizations reevaluate AI usage

ChatGPT on the chopping block as organizations reevaluate AI usage 31/08/2023 at 06:31 By Help Net Security ChatGPT has attracted hundreds of millions of users and was initially praised for its transformative potential. However, concerns for safety controls and unpredictability have landed it on IT leaders’ list of apps to ban in the workplace. In

React to this headline:

Loading spinner

ChatGPT on the chopping block as organizations reevaluate AI usage Read More »

The secret habits of top-performing CISOs

The secret habits of top-performing CISOs 31/08/2023 at 06:02 By Help Net Security 69% of top-performing CISOs dedicate recurring time on their calendars for personal professional development, according to Gartner. This is compared with just 36% of bottom-performing CISOs who do so. “As the CISO role continues to rapidly evolve, it becomes even more critical

React to this headline:

Loading spinner

The secret habits of top-performing CISOs Read More »

What makes a good ASM solution stand out

What makes a good ASM solution stand out 29/08/2023 at 07:31 By Mirko Zorz In this Help Net Security interview, Patrice Auffret, CTO at Onyphe, explains how the traditional perimeter-based security view is becoming obsolete. He suggests that organizations should redefine their attack surface concept and discusses proactive measures they can take to strengthen their

React to this headline:

Loading spinner

What makes a good ASM solution stand out Read More »

Is the cybersecurity community’s obsession with compliance counter-productive?

Is the cybersecurity community’s obsession with compliance counter-productive? 29/08/2023 at 07:01 By Help Net Security Does anyone think the chances of surviving a plane crash increase if our tray tables are locked and our carry-on bags are completely stowed under our seats? That we’ll be OK if the plane hits a mountain if we have

React to this headline:

Loading spinner

Is the cybersecurity community’s obsession with compliance counter-productive? Read More »

Adapting authentication to a cloud-centric landscape

Adapting authentication to a cloud-centric landscape 28/08/2023 at 07:33 By Mirko Zorz In this Help Net Security interview, Florian Forster, CEO at Zitadel, discusses the challenges CISOs face in managing authentication across increasingly distributed and remote workforces, the negative consequences of ineffective authorization, and how the shift toward cloud transformation affects authentication strategies. What are

React to this headline:

Loading spinner

Adapting authentication to a cloud-centric landscape Read More »

What true diversity in the cybersecurity industry looks like

What true diversity in the cybersecurity industry looks like 28/08/2023 at 07:01 By Help Net Security In this Help Net Security video, Larry Whiteside, Jr., CISO at RegScale and President of Cyversity, discusses how, now more than ever, the cybersecurity industry needs the diversity of thought to address the increasingly complex and technology-driven challenges organizations

React to this headline:

Loading spinner

What true diversity in the cybersecurity industry looks like Read More »

The End of “Groundhog Day” for the Security in the Boardroom Discussion?

The End of “Groundhog Day” for the Security in the Boardroom Discussion? 23/08/2023 at 17:19 By Marc Solomon As the SEC cyber incident disclosure rules come into effect, organizations will be forced to seriously consider giving security leaders a seat at the table. The post The End of “Groundhog Day” for the Security in the

React to this headline:

Loading spinner

The End of “Groundhog Day” for the Security in the Boardroom Discussion? Read More »

How the downmarket impacted enterprise cybersecurity budgets

How the downmarket impacted enterprise cybersecurity budgets 23/08/2023 at 07:32 By Help Net Security Belts have tightened, and that ROI and cost reduction are now driving CISO decision-making more than ever. In this Help Net Security video, Sara Behar, Content Manager at YL Ventures, discusses how enterprise cybersecurity budgets have been impacted by the downmarket

React to this headline:

Loading spinner

How the downmarket impacted enterprise cybersecurity budgets Read More »

Maintaining consistent security in diverse cloud infrastructures

Maintaining consistent security in diverse cloud infrastructures 22/08/2023 at 07:01 By Mirko Zorz As cloud infrastructures become increasingly API-driven and dynamically spread across expansive attack surfaces, achieving clarity proves difficult. Compounding this challenge is the integration of DevOps practices, microservices, and container technologies, which, while fostering agility and scalability, introduce additional layers of complexity and

React to this headline:

Loading spinner

Maintaining consistent security in diverse cloud infrastructures Read More »

Scroll to Top