Getting cybersecurity right means CISOs need peer relationships with other operations executives. CISOs need board access and a handle on the company business, writes Ian Keller, director of security at a telecom company. "And then you'll wake up and realize this is not as simple as it sounds."
Huntress has made the largest acquisition in its eight-year history, buying Curricula to boost user education. Huntress evaluated seven companies with security training tools and chose Curricula for its ease of use, manageability for smaller customers and enjoyable online learning experience.
The basic foundation of designing a reliable and dynamic cyber resilience program is to have an elaborate incident response plan that can take into account different cyberthreat scenarios and outcomes, says Singapore-based Christophe Barel, who is managing director for Asia-Pacific at FS-ISAC.
Future quantum computers will decrypt encrypted data, so businesses feel pressure to find quantum-resistant security solutions for data transmission. Wells Fargo Bank's Peter Bordow discusses the state of quantum computing, approaches to quantum security, and privacy-enhancing technologies.
CISO Richard Rushing of Motorola Mobility says that open-mindedness, innovation and a desire to learn are essential qualities for CISOs in order to build dynamic defense strategies to stay ahead of the attackers. He also discusses why partners are critical components in cybersecurity.
Ransomware attacks and data breaches: One thing both have in common is the challenge of attempting to accurately understand their true scale and impact. Too often, data breach notifications lack useful details, while ransomware attacks and ransom payments go unreported.
The latest edition of the ISMG Security Report analyzes why the number of ransomware attacks and the amounts being paid in ransoms are both on the rise. It also discusses today's cyberthreat landscape and whether organizations should rely on user training to improve security.
Chaim Mazal, discusses the issues affecting CISOs, including how increased market share leads to increased problems and how having uniform, automated controls can provide security and enforce compliance.
Tasked with heading cybersecurity in the recently created U.K. Department for International Trade, Don Gibson discusses the opportunities and challenges of building a security program from scratch, including the initial pushback he received and his efforts to win "hearts and minds."
It's not the emerging technology or the increasingly complex threat landscape. Instead, people and process are what prove to be consistently the most challenging parts of the job for Caleb Sima, chief security officer at Robinhood.
Raising user awareness is too often incorrectly considered to be a panacea for faulty information security programs. "It can drive risk reduction, but it is not the primary driver of risk reduction," says Adam Wedgbury, head of enterprise security architecture at Airbus.
McDonald’s Corporation is the world’s largest restaurant chain. Just like every organization, McDonald’s is concerned that threat actors are targeting their employees across the world. It only takes one person to click on a malicious link and create a data breach. Thus, one of their key initiatives is empowering...
Employees are leaving at an unprecedented rate. As a result, the Great Resignation has created more opportunities for data loss than ever before. According to the 2022 Voice of the CISO report, CISOs agree that protecting data has become an increased challenge. So, how do you protect your organization against data...
The latest edition of the ISMG Security Report discusses how financial service organizations should respond to the new "fraud universe." It also shares how CISOs can incorporate social media into their threat intelligence programs and describes the skills required by today's security leaders.
Anneka Gupta, chief product officer at Rubrik, discusses embedding zero trust principles into how the security company provides data resilience, data observability and data recovery for organizations. She also describes the "software-first" approach of building immutability directly into software.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.