CISO

The case for enterprise exposure management

The case for enterprise exposure management 2024-10-07 at 08:01 By Help Net Security For several years, external attack surface management (EASM) has been an important focus for many security organizations and the vendors that serve them. EASM, attempting to discover the full extent of an organization’s external attack surface and remediate issues, had broad purview, […]

React to this headline:

Loading spinner

The case for enterprise exposure management Read More »

Best practices for implementing threat exposure management, reducing cyber risk exposure

Best practices for implementing threat exposure management, reducing cyber risk exposure 2024-10-04 at 07:16 By Mirko Zorz In this Help Net Security interview, Sanaz Yashar, CEO at Zafran, discusses the role of threat exposure management (TEM) in modern cybersecurity strategies. As traditional vulnerability management evolves, TEM addresses the overwhelming risks arising from expanded attack surfaces

React to this headline:

Loading spinner

Best practices for implementing threat exposure management, reducing cyber risk exposure Read More »

What bots mean for businesses and consumers

What bots mean for businesses and consumers 2024-10-02 at 06:31 By Help Net Security Simple bots have existed since the early to mid-2000s when organizations had no means to protect themselves or their website’s users from them. Yet today, despite having tools to protect against these simple bots, two in three organizations have made no

React to this headline:

Loading spinner

What bots mean for businesses and consumers Read More »

AI use: 3 essential questions every CISO must ask

AI use: 3 essential questions every CISO must ask 2024-09-26 at 07:32 By Help Net Security In July, Wall Street experienced its worst day since 2022, with the tech-focused Nasdaq falling by 3.6%. The downturn was largely triggered by what commentators suggest is the result of underwhelming earnings from some major tech companies. What’s notable

React to this headline:

Loading spinner

AI use: 3 essential questions every CISO must ask Read More »

Microsoft Names Deputy CISOs, Governance Council to Manage Security Push 

Microsoft Names Deputy CISOs, Governance Council to Manage Security Push  2024-09-24 at 19:01 By Ryan Naraine Microsoft says each Deputy CISO will oversee specific domains, ranging from gaming and cloud security to AI and government systems. The post Microsoft Names Deputy CISOs, Governance Council to Manage Security Push  appeared first on SecurityWeek. This article is

React to this headline:

Loading spinner

Microsoft Names Deputy CISOs, Governance Council to Manage Security Push  Read More »

Striking the balance between cybersecurity and operational efficiency

Striking the balance between cybersecurity and operational efficiency 2024-09-20 at 07:31 By Mirko Zorz In this Help, Net Security interview, Michael Oberlaender, ex-CISO, and book author, discusses how to strike the right balance between security and operational efficiency. Oberlaender advises companies starting their cybersecurity journey and stresses the importance of aligning with various frameworks. He

React to this headline:

Loading spinner

Striking the balance between cybersecurity and operational efficiency Read More »

The ripple effects of regulatory actions on CISO reporting

The ripple effects of regulatory actions on CISO reporting 2024-09-16 at 06:31 By Help Net Security In this Help Net Security video, Sara Behar, Content Manager at YL Ventures, discusses how recent regulatory actions and high-profile legal incidents involving cybersecurity leaders have influenced CISO reporting. In a recent report of the CISO Circuit, YL Ventures

React to this headline:

Loading spinner

The ripple effects of regulatory actions on CISO reporting Read More »

End of an era: Security budget growth slows down

End of an era: Security budget growth slows down 2024-09-09 at 06:01 By Help Net Security Amidst global economic and geopolitical uncertainty, markets are jittery, companies are spending frugally, and investors remain cautious, according to IANS Research and Artico Search. Security budgets are also affected by these realities with most budgets remaining flat or increasing

React to this headline:

Loading spinner

End of an era: Security budget growth slows down Read More »

vCISO services thrive, but challenges persist

vCISO services thrive, but challenges persist 2024-09-05 at 06:01 By Help Net Security While 75% of service providers report high customer demand for vCISO functionality, a new Cynomi report reveals that only 21% are actively offering it—opening a window onto a growth area for service providers while emphasizing the growing centrality of vCISO services to

React to this headline:

Loading spinner

vCISO services thrive, but challenges persist Read More »

Protecting national interests: Balancing cybersecurity and operational realities

Protecting national interests: Balancing cybersecurity and operational realities 2024-09-04 at 07:31 By Mirko Zorz With cyber threats becoming increasingly sophisticated and targeting critical infrastructure, in this Help Net Security interview, David Ferbrache, managing director of Beyond Blue, discusses the current state of cybersecurity readiness and resilience. Ferbrache talks about the complexities of managing both traditional

React to this headline:

Loading spinner

Protecting national interests: Balancing cybersecurity and operational realities Read More »

CISO Conversations: Jaya Baloo From Rapid7 and Jonathan Trull From Qualys

CISO Conversations: Jaya Baloo From Rapid7 and Jonathan Trull From Qualys 2024-09-03 at 17:16 By Kevin Townsend CSOs Jaya Baloo and Jonathan Trull discuss the route, role, and requirements in becoming and being a successful CISO. The post CISO Conversations: Jaya Baloo From Rapid7 and Jonathan Trull From Qualys appeared first on SecurityWeek. This article

React to this headline:

Loading spinner

CISO Conversations: Jaya Baloo From Rapid7 and Jonathan Trull From Qualys Read More »

How ransomware tactics are shifting, and what it means for your business

How ransomware tactics are shifting, and what it means for your business 2024-09-03 at 07:01 By Mirko Zorz In this Help Net Security interview, Tim West, Director of Threat Intelligence and Outreach at WithSecure, discusses Ransomware-as-a-Service (RaaS) with a focus on how these cybercriminal operations are adapting to increased competition, shifting structures, and a fragmented

React to this headline:

Loading spinner

How ransomware tactics are shifting, and what it means for your business Read More »

A third of organizations suffered a SaaS data breach this year

A third of organizations suffered a SaaS data breach this year 2024-09-03 at 06:01 By Help Net Security While SaaS security is finally getting the attention it deserves, there’s still a significant gap between intent and implementation. Ad hoc strategies and other practices still fall short of a security program. The move toward decentralization has

React to this headline:

Loading spinner

A third of organizations suffered a SaaS data breach this year Read More »

Cybersecurity Maturity: A Must-Have on the CISO’s Agenda

Cybersecurity Maturity: A Must-Have on the CISO’s Agenda 2024-08-29 at 16:46 By Marc Solomon Undertaking a cybersecurity maturity review helps leaders establish a benchmark from which to build a proactive improvement strategy. The post Cybersecurity Maturity: A Must-Have on the CISO’s Agenda appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed

React to this headline:

Loading spinner

Cybersecurity Maturity: A Must-Have on the CISO’s Agenda Read More »

Why ransomware attackers target Active Directory

Why ransomware attackers target Active Directory 2024-08-29 at 07:02 By Help Net Security Ransomware attacks have surged 78% year-over-year, affecting various sectors and organizations and significantly impacting supply chains. In this Help, Net Security video, Craig Birch, Technology Evangelist, and Principal Security Engineer at Cayosoft, discusses the rise of ransomware attacks, why attackers often target

React to this headline:

Loading spinner

Why ransomware attackers target Active Directory Read More »

LinkedIn Hires Former Twitter Security Chief Lea Kissner as New CISO

LinkedIn Hires Former Twitter Security Chief Lea Kissner as New CISO 2024-08-28 at 19:01 By Ryan Naraine Lea Kissner replaces Geoff Belknap as Chief Information Security Officer (CISO) at Microsoft-owned LinkedIn. The post LinkedIn Hires Former Twitter Security Chief Lea Kissner as New CISO appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

LinkedIn Hires Former Twitter Security Chief Lea Kissner as New CISO Read More »

Cybercriminals capitalize on travel industry’s peak season

Cybercriminals capitalize on travel industry’s peak season 2024-08-28 at 06:31 By Help Net Security Cybercriminals are capitalizing on the travel and hospitality industry’s peak season, using increased traffic as cover for their attacks, according to Cequence Security. Researchers investigated the top 10 travel and hospitality sites to identify externally visible edge, cloud infrastructure, application stack,

React to this headline:

Loading spinner

Cybercriminals capitalize on travel industry’s peak season Read More »

When Convenience Costs: CISOs Struggle With SaaS Security Oversight

When Convenience Costs: CISOs Struggle With SaaS Security Oversight 2024-08-27 at 16:31 By Kevin Townsend SaaS applications are so easy to use, the decision, and the deployment, is sometimes undertaken by the business unit user with little reference to, nor oversight from, the security team. The post When Convenience Costs: CISOs Struggle With SaaS Security

React to this headline:

Loading spinner

When Convenience Costs: CISOs Struggle With SaaS Security Oversight Read More »

Half of enterprises suffer breaches despite heavy security investments

Half of enterprises suffer breaches despite heavy security investments 2024-08-27 at 06:32 By Help Net Security Data breaches have become an increasingly severe threat, with recent reports highlighting a surge in their frequency and cost. Understanding the latest trends and statistics surrounding data breaches is essential for developing effective strategies to safeguard sensitive information. This

React to this headline:

Loading spinner

Half of enterprises suffer breaches despite heavy security investments Read More »

Most ransomware attacks occur between 1 a.m. and 5 a.m.

Most ransomware attacks occur between 1 a.m. and 5 a.m. 2024-08-22 at 07:02 By Help Net Security There’s been an alarming increase in ransomware attacks over the past year, alongside significant shifts in the tactics and strategies employed by cybercriminals that underscore the necessity for organizations to implement around-the-clock monitoring and investigation of suspicious behaviors,

React to this headline:

Loading spinner

Most ransomware attacks occur between 1 a.m. and 5 a.m. Read More »

Scroll to Top