CISO

One in five CISOs miss out on pay raise

One in five CISOs miss out on pay raise 17/10/2023 at 07:03 By Help Net Security The CISO role was partially shielded from the macroeconomic challenges of 2023, according to a new research from IANS and Artico Search. 20% of CISOs did not receive a raise The most recent average CISO total compensation increase was […]

React to this headline:

Loading spinner

One in five CISOs miss out on pay raise Read More »

CISOs and board members are finding a common language

CISOs and board members are finding a common language 16/10/2023 at 07:39 By Help Net Security 86% of CISOs believe generative AI will alleviate skills gaps and talent shortages on the security team, filling labor-intensive and time-consuming security functions and freeing up security professionals to be more strategic, according to Splunk. 35% report using generative

React to this headline:

Loading spinner

CISOs and board members are finding a common language Read More »

CISO Pay Increases Are Slowing – a Look Behind the Figures

CISO Pay Increases Are Slowing – a Look Behind the Figures 12/10/2023 at 14:46 By Kevin Townsend How much do CISOs make? Survey provides compensation trends for Chief Information Security Officers, but don’t take surveys at full face value. The post CISO Pay Increases Are Slowing – a Look Behind the Figures appeared first on

React to this headline:

Loading spinner

CISO Pay Increases Are Slowing – a Look Behind the Figures Read More »

Are executives adequately guarding their gadgets?

Are executives adequately guarding their gadgets? 06/10/2023 at 07:02 By Help Net Security Today, individual citizens, rather than businesses or governmental bodies, are the main entry points for cyberattacks. However, security solutions haven’t evolved sufficiently to guard public figures and leaders as they do for large corporate entities. In this Help Net Security video, Amir

React to this headline:

Loading spinner

Are executives adequately guarding their gadgets? Read More »

The root cause of open-source risk

The root cause of open-source risk 05/10/2023 at 06:02 By Help Net Security 2023 saw twice as many software supply chain attacks as 2019-2022 combined. Sonatype logged 245,032 malicious packages in 2023. One in eight open-source downloads today poses known and avoidable risks. Vulnerabilities can still be prevented Nearly all (96%) vulnerabilities are still avoidable.

React to this headline:

Loading spinner

The root cause of open-source risk Read More »

Evolving conversations: Cybersecurity as a business risk

Evolving conversations: Cybersecurity as a business risk 03/10/2023 at 08:03 By Help Net Security Board members often lack technical expertise and may not fully grasp cyber risks. On the other hand, CISOs are more accustomed to interfacing with IT staff. This is understandable; the board is responsible for guiding high-level decision-making. They rarely become involved

React to this headline:

Loading spinner

Evolving conversations: Cybersecurity as a business risk Read More »

CISO’s compass: Mastering tech, inspiring teams, and confronting risk

CISO’s compass: Mastering tech, inspiring teams, and confronting risk 03/10/2023 at 07:32 By Mirko Zorz In this Help Net Security interview, Okey Obudulu, CISO at Skillsoft, talks about the increasing complexity of the CISO role and challenges they face. He discusses the business environment, tech innovation, the evolving regulatory landscape, limited resources, and budgets. Obudulu

React to this headline:

Loading spinner

CISO’s compass: Mastering tech, inspiring teams, and confronting risk Read More »

Why California’s Delete Act matters for the whole country

Why California’s Delete Act matters for the whole country 29/09/2023 at 06:32 By Help Net Security The California State Legislature passed Senate Bill 362, known as the Delete Act, to simplify the process for consumers to ask to remove their personal data gathered by data brokers. In this Help Net Security video, Dr. Chris Pierson,

React to this headline:

Loading spinner

Why California’s Delete Act matters for the whole country Read More »

Cybersecurity budgets show moderate growth

Cybersecurity budgets show moderate growth 29/09/2023 at 06:01 By Help Net Security Despite the economic uncertainty and inflation, security budgets generally continued to rise but at a lower rate than prior years, according to new research from IANS and Artico Search. Security budgets increase by 6% in 2023 Respondents reported an average security budget increase

React to this headline:

Loading spinner

Cybersecurity budgets show moderate growth Read More »

The CISO Carousel and its Effect on Enterprise Cybersecurity

The CISO Carousel and its Effect on Enterprise Cybersecurity 26/09/2023 at 14:46 By Kevin Townsend CISO churn is a hidden cybersecurity threat. Major security initiatives or implementations can take longer than the residency of a single CISO, and constant churn can leave cracks or gaps in security. The post The CISO Carousel and its Effect

React to this headline:

Loading spinner

The CISO Carousel and its Effect on Enterprise Cybersecurity Read More »

An inside look at NetSPI’s impressive Breach and Attack Simulation platform

An inside look at NetSPI’s impressive Breach and Attack Simulation platform 19/09/2023 at 08:02 By Mirko Zorz In this Help Net Security interview, Scott Sutherland, VP of Research at NetSPI, delves into the intricacies of their Breach and Attack Simulation (BAS) platform and discusses how it offers unique features – from customizable procedures to advanced

React to this headline:

Loading spinner

An inside look at NetSPI’s impressive Breach and Attack Simulation platform Read More »

The hidden dangers of low-value data

The hidden dangers of low-value data 18/09/2023 at 08:05 By Help Net Security In this Help Net Security video, Terry Ray, SVP Data Security and Field CTO at Imperva, warns organizations to stop ignoring low-value data – as criminals use it as a place to live, watch, and wait for the perfect moment to steal

React to this headline:

Loading spinner

The hidden dangers of low-value data Read More »

Great security training is a real challenge

Great security training is a real challenge 14/09/2023 at 07:31 By Help Net Security All employees need security training, yet it’s generally a resented afterthought. A variety of studies over years show that human error is generally felt to be the largest vulnerability in organizations. For technology companies like SaaS providers, who also need to

React to this headline:

Loading spinner

Great security training is a real challenge Read More »

The critical role of authorization in safeguarding financial institutions

The critical role of authorization in safeguarding financial institutions 14/09/2023 at 07:01 By Help Net Security According to a recent Cost of Data Breach report, the financial industry has the second highest average cost for a data breach, making the value well worth financial institutions investing more into authorization. In this Help Net Security video,

React to this headline:

Loading spinner

The critical role of authorization in safeguarding financial institutions Read More »

CISOs and Board Reporting – an Ongoing Problem

CISOs and Board Reporting – an Ongoing Problem 13/09/2023 at 18:49 By Kevin Townsend Boards often complain they receive overly-technical reports from management teams that fail to put governance in business and financial terms. The post CISOs and Board Reporting – an Ongoing Problem appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

CISOs and Board Reporting – an Ongoing Problem Read More »

How should SMBs navigate the phishing minefield?

How should SMBs navigate the phishing minefield? 13/09/2023 at 07:47 By Zeljka Zorz In this Help Net Security interview, Pete Hoff, CISO at Wursta, offers advice to SMB security leaders and professionals on how to minimize the threat phishing presents to their organization’s operations and long-term success. What makes phishing attacks particularly challenging for small

React to this headline:

Loading spinner

How should SMBs navigate the phishing minefield? Read More »

CISOs need to be forceful to gain leverage in the boardroom

CISOs need to be forceful to gain leverage in the boardroom 12/09/2023 at 06:32 By Help Net Security Over 70% of CISOs feel that the importance of information security is not recognised by senior leadership, according to BSS. The CISOs said their top four highest investment priorities in 2023 are change management (35%), information security

React to this headline:

Loading spinner

CISOs need to be forceful to gain leverage in the boardroom Read More »

CISOs and board members work more closely than ever before

CISOs and board members work more closely than ever before 11/09/2023 at 08:31 By Help Net Security 73% of board members believe they face the risk of a major cyber attack in the next 12 months, a notable increase from 65% in 2022, according to Proofpoint. Likewise, 53% feel unprepared to cope with a targeted

React to this headline:

Loading spinner

CISOs and board members work more closely than ever before Read More »

The Team8 Foundry Method for Selecting Investable Startups

The Team8 Foundry Method for Selecting Investable Startups 07/09/2023 at 18:46 By Kevin Townsend Team8, a VC organization with added sauce, queried more than 130 CISOs from its own ‘CISO Village’ to discover the concerns of existing cybersecurity practitioners, and the technologies they are seeking for the future. The post The Team8 Foundry Method for

React to this headline:

Loading spinner

The Team8 Foundry Method for Selecting Investable Startups Read More »

Shifting left and right, innovating product security

Shifting left and right, innovating product security 07/09/2023 at 07:03 By Mirko Zorz In this Help Net Security interview, Slava Bronfman, CEO at Cybellum, discusses approaches for achieving product security throughout a device’s entire lifecycle, fostering collaboration across business units and product lines, ensuring transparency and security in the supply chain, and meeting regulatory requirements

React to this headline:

Loading spinner

Shifting left and right, innovating product security Read More »

Scroll to Top