CISO

Striking the balance between cybersecurity and operational efficiency

Striking the balance between cybersecurity and operational efficiency 2024-09-20 at 07:31 By Mirko Zorz In this Help, Net Security interview, Michael Oberlaender, ex-CISO, and book author, discusses how to strike the right balance between security and operational efficiency. Oberlaender advises companies starting their cybersecurity journey and stresses the importance of aligning with various frameworks. He […]

React to this headline:

Loading spinner

Striking the balance between cybersecurity and operational efficiency Read More »

The ripple effects of regulatory actions on CISO reporting

The ripple effects of regulatory actions on CISO reporting 2024-09-16 at 06:31 By Help Net Security In this Help Net Security video, Sara Behar, Content Manager at YL Ventures, discusses how recent regulatory actions and high-profile legal incidents involving cybersecurity leaders have influenced CISO reporting. In a recent report of the CISO Circuit, YL Ventures

React to this headline:

Loading spinner

The ripple effects of regulatory actions on CISO reporting Read More »

End of an era: Security budget growth slows down

End of an era: Security budget growth slows down 2024-09-09 at 06:01 By Help Net Security Amidst global economic and geopolitical uncertainty, markets are jittery, companies are spending frugally, and investors remain cautious, according to IANS Research and Artico Search. Security budgets are also affected by these realities with most budgets remaining flat or increasing

React to this headline:

Loading spinner

End of an era: Security budget growth slows down Read More »

vCISO services thrive, but challenges persist

vCISO services thrive, but challenges persist 2024-09-05 at 06:01 By Help Net Security While 75% of service providers report high customer demand for vCISO functionality, a new Cynomi report reveals that only 21% are actively offering it—opening a window onto a growth area for service providers while emphasizing the growing centrality of vCISO services to

React to this headline:

Loading spinner

vCISO services thrive, but challenges persist Read More »

Protecting national interests: Balancing cybersecurity and operational realities

Protecting national interests: Balancing cybersecurity and operational realities 2024-09-04 at 07:31 By Mirko Zorz With cyber threats becoming increasingly sophisticated and targeting critical infrastructure, in this Help Net Security interview, David Ferbrache, managing director of Beyond Blue, discusses the current state of cybersecurity readiness and resilience. Ferbrache talks about the complexities of managing both traditional

React to this headline:

Loading spinner

Protecting national interests: Balancing cybersecurity and operational realities Read More »

CISO Conversations: Jaya Baloo From Rapid7 and Jonathan Trull From Qualys

CISO Conversations: Jaya Baloo From Rapid7 and Jonathan Trull From Qualys 2024-09-03 at 17:16 By Kevin Townsend CSOs Jaya Baloo and Jonathan Trull discuss the route, role, and requirements in becoming and being a successful CISO. The post CISO Conversations: Jaya Baloo From Rapid7 and Jonathan Trull From Qualys appeared first on SecurityWeek. This article

React to this headline:

Loading spinner

CISO Conversations: Jaya Baloo From Rapid7 and Jonathan Trull From Qualys Read More »

How ransomware tactics are shifting, and what it means for your business

How ransomware tactics are shifting, and what it means for your business 2024-09-03 at 07:01 By Mirko Zorz In this Help Net Security interview, Tim West, Director of Threat Intelligence and Outreach at WithSecure, discusses Ransomware-as-a-Service (RaaS) with a focus on how these cybercriminal operations are adapting to increased competition, shifting structures, and a fragmented

React to this headline:

Loading spinner

How ransomware tactics are shifting, and what it means for your business Read More »

A third of organizations suffered a SaaS data breach this year

A third of organizations suffered a SaaS data breach this year 2024-09-03 at 06:01 By Help Net Security While SaaS security is finally getting the attention it deserves, there’s still a significant gap between intent and implementation. Ad hoc strategies and other practices still fall short of a security program. The move toward decentralization has

React to this headline:

Loading spinner

A third of organizations suffered a SaaS data breach this year Read More »

Cybersecurity Maturity: A Must-Have on the CISO’s Agenda

Cybersecurity Maturity: A Must-Have on the CISO’s Agenda 2024-08-29 at 16:46 By Marc Solomon Undertaking a cybersecurity maturity review helps leaders establish a benchmark from which to build a proactive improvement strategy. The post Cybersecurity Maturity: A Must-Have on the CISO’s Agenda appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed

React to this headline:

Loading spinner

Cybersecurity Maturity: A Must-Have on the CISO’s Agenda Read More »

Why ransomware attackers target Active Directory

Why ransomware attackers target Active Directory 2024-08-29 at 07:02 By Help Net Security Ransomware attacks have surged 78% year-over-year, affecting various sectors and organizations and significantly impacting supply chains. In this Help, Net Security video, Craig Birch, Technology Evangelist, and Principal Security Engineer at Cayosoft, discusses the rise of ransomware attacks, why attackers often target

React to this headline:

Loading spinner

Why ransomware attackers target Active Directory Read More »

LinkedIn Hires Former Twitter Security Chief Lea Kissner as New CISO

LinkedIn Hires Former Twitter Security Chief Lea Kissner as New CISO 2024-08-28 at 19:01 By Ryan Naraine Lea Kissner replaces Geoff Belknap as Chief Information Security Officer (CISO) at Microsoft-owned LinkedIn. The post LinkedIn Hires Former Twitter Security Chief Lea Kissner as New CISO appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

LinkedIn Hires Former Twitter Security Chief Lea Kissner as New CISO Read More »

Cybercriminals capitalize on travel industry’s peak season

Cybercriminals capitalize on travel industry’s peak season 2024-08-28 at 06:31 By Help Net Security Cybercriminals are capitalizing on the travel and hospitality industry’s peak season, using increased traffic as cover for their attacks, according to Cequence Security. Researchers investigated the top 10 travel and hospitality sites to identify externally visible edge, cloud infrastructure, application stack,

React to this headline:

Loading spinner

Cybercriminals capitalize on travel industry’s peak season Read More »

When Convenience Costs: CISOs Struggle With SaaS Security Oversight

When Convenience Costs: CISOs Struggle With SaaS Security Oversight 2024-08-27 at 16:31 By Kevin Townsend SaaS applications are so easy to use, the decision, and the deployment, is sometimes undertaken by the business unit user with little reference to, nor oversight from, the security team. The post When Convenience Costs: CISOs Struggle With SaaS Security

React to this headline:

Loading spinner

When Convenience Costs: CISOs Struggle With SaaS Security Oversight Read More »

Half of enterprises suffer breaches despite heavy security investments

Half of enterprises suffer breaches despite heavy security investments 2024-08-27 at 06:32 By Help Net Security Data breaches have become an increasingly severe threat, with recent reports highlighting a surge in their frequency and cost. Understanding the latest trends and statistics surrounding data breaches is essential for developing effective strategies to safeguard sensitive information. This

React to this headline:

Loading spinner

Half of enterprises suffer breaches despite heavy security investments Read More »

Most ransomware attacks occur between 1 a.m. and 5 a.m.

Most ransomware attacks occur between 1 a.m. and 5 a.m. 2024-08-22 at 07:02 By Help Net Security There’s been an alarming increase in ransomware attacks over the past year, alongside significant shifts in the tactics and strategies employed by cybercriminals that underscore the necessity for organizations to implement around-the-clock monitoring and investigation of suspicious behaviors,

React to this headline:

Loading spinner

Most ransomware attacks occur between 1 a.m. and 5 a.m. Read More »

Why C-suite leaders are prime cyber targets

Why C-suite leaders are prime cyber targets 2024-08-22 at 06:32 By Help Net Security Senior executives are prime targets for cybercriminals, with 72% of surveyed cybersecurity professionals in the US reporting that cyberattacks have targeted this group in the past 18 months. This trend, highlighted in GetApp’s 2024 Executive Cybersecurity Report, underscores the growing sophistication

React to this headline:

Loading spinner

Why C-suite leaders are prime cyber targets Read More »

Food security: Accelerating national protections around critical infrastructure

Food security: Accelerating national protections around critical infrastructure 2024-08-21 at 06:31 By Help Net Security In this Help Net Security video, Mike Lexa, CISO and Global VP of IT Infrastructure and Operations at CNH, discusses how the federal government is taking food security more seriously and what steps must be taken to prioritize security measures.

React to this headline:

Loading spinner

Food security: Accelerating national protections around critical infrastructure Read More »

How Exceptional CISOs Are Igniting the Security Fire in Their Development Team

How Exceptional CISOs Are Igniting the Security Fire in Their Development Team 2024-08-20 at 14:16 By Matias Madou For years, many CISOs have struggled to influence their development cohort on the importance of putting security first. The post How Exceptional CISOs Are Igniting the Security Fire in Their Development Team appeared first on SecurityWeek. This

React to this headline:

Loading spinner

How Exceptional CISOs Are Igniting the Security Fire in Their Development Team Read More »

Strategies for security leaders: Building a positive cybersecurity culture

Strategies for security leaders: Building a positive cybersecurity culture 2024-08-20 at 07:32 By Help Net Security Culture is a catalyst for security success. It can significantly reduce cybersecurity risks and boost cybersecurity resilience of any organization. Culture can also greatly enhance the perceived value, relevance and reputation of the cybersecurity function. So how can security

React to this headline:

Loading spinner

Strategies for security leaders: Building a positive cybersecurity culture Read More »

AI for application security: Balancing automation with human oversight

AI for application security: Balancing automation with human oversight 2024-08-20 at 07:01 By Mirko Zorz In this Help Net Security interview, Kyle Wickert, Worldwide Strategic Architect at AlgoSec, discusses the role of AI in application security, exploring how it’s transforming threat detection and response. Wickert talks about integrating security testing throughout the development lifecycle, the

React to this headline:

Loading spinner

AI for application security: Balancing automation with human oversight Read More »

Scroll to Top