iPaaS apps are vulnerable because they transport highly sensitive data from core systems, include many different third-party apps in the process, and often lack security tools to govern and secure them all. In this video for Help Net Security, Alon Jac…
Tag: CISO
Global Security News, North America
How companies are prioritizing infosec and compliance
by Help Net Security •
New research conducted by Enterprise Management Associates (EMA), examines the impact of the compliance budget on security strategy and priorities. It describes areas for which companies prioritize information security and compliance, which leaders con…
Global Security News, North America
Despite known security issues, VPN usage continues to thrive
by Help Net Security •
VPN usage is still prevalent among 90% of security teams who have highlighted cost, time, and difficulty as reasons to not move forward with ZTNA adoption, according to a new survey conducted by Sapio Research. Furthermore, 97% say that adopting a zero…
North America
Attracting Cybersecurity Talent Takes an Open Mind, Creativity and Honesty
by George Platsis •
Retaining cybersecurity talent can be difficult. Along with our previous tips, how can you attract great workers? Difficulties and Positive Changes The recent ISACA State of Cybersecurity 2022 survey provides some key markers: Unfilled positions are on the rise (not good) Existing teams are understaffed (not good) Budgets are (finally) increasing (good) University degree mandates […]
The post Attracting Cybersecurity Talent Takes an Open Mind, Creativity and Honesty appeared first on Security Intelligence.
Global Security News, North America
Rate of IT security incidents grows with company size
by Help Net Security •
The rate of IT security incidents increases the more Microsoft 365 security features are used, according to Hornetsecurity. Organizations using Microsoft 365 and that use 1 or 2 of its stock security features reported attacks 24.4% and 28.2% of the tim…
Global Security News, North America
How the blurring of the “supply chain” opens your doors to attackers—and how you can close them
by Help Net Security •
There have been more than 200 dedicated supply chain attacks over the past decade. Some of these campaigns have affected countless supplier networks and millions of customers – SolarWinds, Kaseya and the recent Log4j debacle come to mind. But giv…
North America
Who Is Legally Responsible for a Cyber Incident?
by Sue Poremba •
After a company discovers a cyber attack on its network, the finger-pointing begins. The CEO blames the chief information security officer (CISO). The CISO blames the financial officers for not setting aside enough money for cyber defenses. The chief information officer begins to look for a scapegoat further down the supply chain. Maybe they fire […]
The post Who Is Legally Responsible for a Cyber Incident? appeared first on Security Intelligence.
Europe, Global Security News, North America
Build Your Career in Cybersecurity: Essential Jobs and Salary in 2022
by Jane Turner •
To be honest, a lot has changed since the invention of the wheel. While the wheel may have happened a while ago, digital data is part of our generation. It’s what holds our world together, and perhaps it is the wheel that companies and organizations r…
Global Security News, North America
Saas security: How to avoid “death by 1000 apps”
by Help Net Security •
SaaS applications have become synonymous with modern business environments, and CISOs and security teams struggle to find a happy medium between ensuring the security of their SaaS portfolio and empowering the organization’s streamlined business workfl…
Security Vendor News
How CISOs can Find and Retain Security Staff During the Great Resignation
by Nik Hewitt •
The rising demand for cybersecurity professionals As if the skill shortfall in cybersecurity wasn’t bad enough, the employment landscape is shifting rapidly. This shift is due, in part, to historically low unemployment claims, unrivaled quit rates, and swathes of baby boomers and older Gen X experts retiring – commonly known in HR circles as The […]
The post How CISOs can Find and Retain Security Staff During the Great Resignation appeared first on Blog.
Global IT News
RSA Conference 2022 – Advice to a new CISO: Shut up and listen
by Howard Solomon •
CISO panel talks about what the first three months on the job are like
The post RSA Conference 2022 – Advice to a new CISO: Shut up and listen first appeared on IT World Canada.
Global Security News, North America
Recovery and resilience: CISO insights into the 2022 cybersecurity landscape
by Help Net Security •
I recently had the opportunity to meet and speak with several luminaries of the global security ecosystem: Roger Hale – Chief Security Officer; BigID, Sounil Yu – CISO and Head of Research at JupiterOne; Debbie Taylor Moore – VP and S…
Global Security News, North America
Attackers aren’t slowing down, here’s what researchers are seeing
by Mirko Zorz •
In this Help Net Security interview, John Shier, Senior Security Advisor at Sophos, talks about the main findings of two Sophos reports: the 2022 Active Adversary Report and the State of Ransomware Report, which provide an exceptional overview of the m…
Europe, Global Security News, North America
Five Questions To Ask Your CISO About Training
by Ed Amoroso •
Cybersecurity has emerged as an important component of the conversations that occur at the senior executive and board levels. Furthermore, it is no longer uncommon for boards and leadership teams to include at least one member who has some experience …
Global Security News, North America
Qualys VMDR 2.0 with TruRisk: Taking vulnerability management to the next level
by Mirko Zorz •
In this interview for Help Net Security, Mehul Revankar, VP of Product Management & Engineering for VMDR at Qualys, talks about Qualys Vulnerability Management, Detection and Response (VMDR) 2.0 with TruRisk. The solution gives unprecedented insig…
Global Security News, North America
How cybercriminals are targeting executives at home and their families
by Help Net Security •
Top executives and their families are increasingly being targeted on their personal devices and home networks, as sophisticated threat actors look for new ways to bypass corporate security and get direct access to highly sensitive data. In this video f…
North America
To Retain Cybersecurity Employees, Know What Drives Them
by George Platsis •
COVID-19 may have given cybersecurity talent retention an artificial prop up over the last two years. For example, job satisfaction was on a downward trend from 2018 to 2019, but with the pandemic came a plateau in 2020 and 2021. Was the plateau due to newfound satisfaction or were there other factors, such as economic […]
The post To Retain Cybersecurity Employees, Know What Drives Them appeared first on Security Intelligence.
Global Security News, North America
How confident are companies in managing their current threat exposure?
by Help Net Security •
Crossword Cybersecurity has released a report based on the findings of a survey of over 200 CISOs and senior UK cyber security professionals. The paper reveals companies are more concerned and exposed to cyber threats than ever before, with 61 percent …
Europe, Global Security News, North America, Vulnerabilities
Is SaaS a Threat or a Boon to Cybersecurity?
by Misha Seltzer •
The IT threat landscape continues to grow by the day, and the latest vehicle for an attack is SaaS—the web-based applications that many organizations have become dependent on for efficiency and productivity, a dependency that has only grown over the p…
Global Security News, North America
How confident are CISOs about their security posture?
by Help Net Security •
Proofpoint released its annual Voice of the CISO report, which explores key challenges facing chief information security officers (CISOs). While the world’s CISOs spent 2021 coming to terms with new ways of working, many now feel much more in control o…
Europe, Global Security News, North America
How do Red Team Exercises help CISO to Validate the Security Controls Effectively?
by Geetha R •
Red Team Exercises are one of the best ways for CISOs to validate the security controls effectively. By simulating a real-world attack, Red Team exercises help organizations identify their vulnerabilities and determine how well their security controls …
Europe, Global Security News, North America
Cybersecurity in the Boardroom: How to Report Risk to Leadership
by Shay Siksik •
Cybersecurity threats are continuing to evolve and become more widespread. These advanced attacks include everything from malware and phishing to artificial intelligence, ransomware and more, endangering the assets of governments, organizations and in…
Security Vendor News
8 Ways to Avoid CISO Burnout
by Nik Hewitt •
Times have changed In recent years the job of Chief Information Security Officer (CISO) has become more and more frenetic and involved. Already stretched CISOs have the added responsibilities of employee management in a time of a global pandemic, staff retention when priorities have changed and home-working has become the norm, and meeting ever more […]
The post 8 Ways to Avoid CISO Burnout appeared first on Blog.
North America
Avoiding the Unintended Consequences of Strict Cybersecurity Policies
by George Platsis •
Does the left hand know what the right hand is doing? Or does even the left pinky know what the left ring finger is doing? Problems can easily arise when policies, including cybersecurity ones, end up being out of sync with business, technical, legal or regulatory requirements. The situation becomes even more severe when policy […]
The post Avoiding the Unintended Consequences of Strict Cybersecurity Policies appeared first on Security Intelligence.
Global Security News, North America
10 best practices to reduce the probability of a material breach
by Help Net Security •
ThoughtLab announced the findings of its 2022 cybersecurity benchmarking study which analyzed the cybersecurity strategies and results of 1,200 large organizations across 14 different sectors and 16 countries, representing $125.2 billion of annual cybe…
Europe, Global Security News, North America, Vulnerabilities
Security Advocacy in the Cloud with Jacob Ansari from Schellman
by Anitian •
In this episode, we talk with Jacob Ansari, a Security Advocate at Schellman, where he leads the firm’s security best practices advocacy. He develops and leads educational efforts on security practices, emerging threats, and security industry developme…
Europe, Global Security News, North America
Cybersecurity for Startups with Josh Feinblum from Stavvy
by Tom Eston •
Josh Feinblum is the co-founder of Stavvy, a Boston-based fully integrated digital mortgage platform, where he leads product, engineering, people, and finance. He also serves as a venture partner at F-Prime Capital, where he evaluates and advises start…
Global Security News, North America
Data centers on steel wheels: Can we trust the safety of the railway infrastructure?
by Helga Labus •
In this interview for Help Net Security, Dimitri van Zantvliet Rozemeijer, CISO at Nederlandse Spoorwegen (Dutch Railways), talks about railway cybersecurity and the progresses this industry has made to guarantee safety. Critical infrastructure has see…
North America
Modern Identity and Access Management Makes a Difference, Especially at a Mega-Scale
by Mark Stone •
As businesses embrace more remote users and a hybrid work model, managing user identity and access is more important than ever. Add authentication for millions of third parties and non-employees, and thousands of applications and IoT devices to the mix and you start to understand how important identity and access management (IAM) is. What Exactly […]
The post Modern Identity and Access Management Makes a Difference, Especially at a Mega-Scale appeared first on Security Intelligence.
Global Security News, North America
7 threat detection challenges CISOs face and what they can do about it
by Help Net Security •
Security operations (SecOps) teams continue to be under a constant deluge of new attacks and malware variants. In fact, according to recent research, there were over 170 million new malware variants in 2021 alone. As a result, the burden on CISOs and t…
Global Security News, North America
A checklist to help healthcare organizations respond to a serious cyberattack
by Zeljka Zorz •
How should organizations in the healthcare sector respond to outage due to a serious cyberattack? The Healthcare and Public Health Sector Coordinating Council’s (HSCC) Cybersecurity Working Group (CWG) has released a tactical checklist aimed at h…
Europe, Global Security News, North America
AppSec Champions Bring Security Front and Center
by Sue Poremba •
Twenty years ago, Bill Gates foresaw the security threats looming as new technologies were introduced and threat actors were ramping up their efforts. He urged for including security development at every stage of the software life cycle in his company…
Europe, Global Security News, North America, Vulnerabilities
How Log4j Reshaped Cloud Security Thinking
by Nathan Eddy •
IT leaders are changing the way they secure cloud workloads in the aftermath of the Log4j vulnerability, according to a report from Valtix.
The post How Log4j Reshaped Cloud Security Thinking appeared first on Security Boulevard.
North America
Putting Your SOC in the Hot Seat
by Camille Singleton •
Today’s Security Operations Centers (SOCs) are being stress-tested as never before. As the heart of any organization’s cybersecurity apparatus, SOCs are the first line of defense, running 24/7 operations to watch for alerts of attacks and appropriately address those alerts before they become all-out crises. Yet with ransomware attacks maintaining first place as the top […]
The post Putting Your SOC in the Hot Seat appeared first on Security Intelligence.
Security Bloggers, Security Vendor News
Why XDR Adoption Should Be a CISO Priority
by Anthony M. Freed •
At the start of 2022, the results of a survey were published where CISOs and other security leaders shared their top cybersecurity challenges. “Managing increased risk of ransomware/cyber-extortion” came out on top, with 29% of respondents …
North America
Cybersecurity for a More Sustainable Future
by Bill Venteicher •
As we celebrate Earth Day 2022, companies around the world, including IBM, are continuing broad investment in efforts to combat climate change and strive to bring new ideas to the world in support of sustainability and to make the world a better place for future generations. While the connection between cybersecurity and the environment is […]
The post Cybersecurity for a More Sustainable Future appeared first on Security Intelligence.
Global Security News, North America
What’s a vCISO and why does your company need one?
by Help Net Security •
In this video for Help Net Security, Jeff Hoskins, vCISO at BARR Advisory, explains the concept of a vCISO, which stands for virtual chief information security officer, and describes the services that a vCISO might provide. A vCISO is an outside consul…
Europe, Global Security News, North America
How to Evaluate Cloud Service Provider Security (Checklist)
by Sonrai Security Marketing •
Public cloud adoption is rising among companies across all industries. In a recent survey, over half of companies indicated they’re […]
The post How to Evaluate Cloud Service Provider Security (Checklist) appeared first on Sonrai Security.
The post How…
Global Security News, North America
The CISO as brand enabler, customer advocate, and product visionary
by Help Net Security •
Just over a quarter-century ago, the first Chief Information Security Officer (CISO) was minted in the financial vertical, and everyone lived happily ever after. The End. If only this story was that simple and straightforward! The CISO role has never b…
Europe, Global Security News, North America
Don’t Be Confused By the Acronyms: CWPP, CSPM & CIEM
by Eric Kedrosky •
Speedy innovation and disruptions to traditional business has created the potential for extraordinary value in the tech world. However, moving too […]
The post Don’t Be Confused By the Acronyms: CWPP, CSPM & CIEM appeared first on Sonrai Security….