Tag: cio
-
Inside CyberArk’s security strategy
CyberArk CIO Omer Grossman talks up the company’s security-first ethos, the importance of an assumed breach mentality and how the company is addressing threats from the growing use of AI First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366618330/Inside-CyberArks-security-strategy
-
CISOs’ top 12 cybersecurity priorities for 2025
by
in SecurityNews
Tags: access, ai, api, attack, authentication, automation, awareness, business, cio, ciso, cloud, compliance, control, corporate, cybersecurity, data, detection, framework, governance, identity, incident response, infrastructure, intelligence, jobs, mitigation, monitoring, mssp, oracle, penetration-testing, privacy, risk, risk-management, service, strategy, technology, threat, training, usa, zero-trustSecurity chief Andrew Obadiaru’s to-do list for the upcoming year will be familiar to CISOs everywhere: advance a zero-trust architecture in the organization; strengthen identity and access controls as part of that drive; increase monitoring of third-party risks; and expand the use of artificial intelligence in security operations.”Nothing is particularly new, maybe AI is newer,…
-
Cybersecurity needs women, and it needs to treat them better
by
in SecurityNews
Tags: cio, ciso, computer, cyber, cyberattack, cybersecurity, data-breach, group, healthcare, jobs, service, skills, technology, trainingThe participation of women in cybersecurity is vital, a non-negotiable proposition. Forget any current handwringing over diversity and equity; it’s fundamental that the contribution of women to the profession has made cybersecurity better.The proverbial door was kicked open long ago for women, who have made major contributions to the development of information security. But it’s…
-
7 top cybersecurity projects for 2025
by
in SecurityNews
Tags: access, advisory, ai, backup, best-practice, breach, business, cio, ciso, cloud, compliance, control, cyber, cybersecurity, data, data-breach, detection, encryption, framework, google, governance, infrastructure, intelligence, law, mitigation, monitoring, network, resilience, risk, risk-management, service, strategy, technology, threat, tool, vulnerabilityAs 2025 dawns, CISOs face the grim reality that the battle against cyberattackers never ends. Strong and carefully planned cybersecurity projects are the best way to stay a step ahead of attackers and prevent them gaining the upper hand.”Urgency is the mantra for 2025,” says Greg Sullivan, founding partner of cybersecurity services firm CIOSO Global.…
-
The CFO may be the CISO’s most important business ally
by
in SecurityNewsCISOs frequently encounter inherent conflicts with business colleagues in their day-to-day responsibilities. In many ways, this is the nature of setting security policies for an organization. But the goal for CISOs should be to reset this dynamic and forge a strong, collaborative alliance with their critical leadership counterparts.Take the CFO, for example. For many CISOs,…
-
CISOs embrace rise in prominence, with broader business authority
by
in SecurityNews
Tags: ai, attack, business, ceo, cio, ciso, compliance, control, corporate, cyber, cyberattack, cybersecurity, data, governance, healthcare, infrastructure, intelligence, network, privacy, regulation, risk, risk-management, security-incident, strategy, technology, threat, updateIt’s a familiar refrain: As cybersecurity has become a core business priority, it is no longer a siloed operation, and the responsibilities of CISOs have grown, giving them greater prominence within the organization.According to CSO’s 2024 Security Priorities Study, 72% of security decision-makers say their role has grown to include additional responsibilities over the past…
-
How CISOs can forge the best relationships for cybersecurity investment
by
in SecurityNews
Tags: access, ai, business, ceo, cio, ciso, communications, control, cyber, cybersecurity, data, finance, framework, group, guide, metric, network, privacy, risk, risk-analysis, risk-management, threat, tool, zero-trustWhen it comes to securing cybersecurity investments there are many things at play. The key often lies in the CISO’s ability to build relationships with key stakeholders across the organization. However, CISOs are being tasked with protecting their organizations while navigating budget constraints.Although nearly two-thirds of CISOs report budget increases, funding is only up 8%…
-
AWS re:Invent 2024: The Future of Cloud, AI and Resilience
by
in SecurityNewsISMG Compendium Showcases More Than 50 Interviews on Threats, Emerging Solutions. Welcome to Information Security Media Group’s AWS re:Invent 2024 Compendium featuring the latest insights from the industry’s premier cloud computing conference and the perspectives of CIOs, CISOs and other technology leaders on the future of IT and how to secure it. First seen on…
-
Blown the cybersecurity budget? Here are 7 ways cyber pros can save money
by
in SecurityNews
Tags: access, advisory, ai, automation, business, cio, ciso, cloud, control, cyber, cybersecurity, finance, governance, group, guide, infrastructure, intelligence, international, jobs, office, risk, service, skills, software, strategy, technology, threat, tool, training, vulnerability, vulnerability-managementIt’s hard to find a CISO or cybersecurity leader who has the money they need to pay for all the work they want to do.A majority of CISOs (57%) said they expect to see an increase in their cybersecurity budgets over the next one to two years, according to Deloitte’s Global Future of Cyber Report,…
-
7 biggest cybersecurity stories of 2024
by
in SecurityNews
Tags: access, ai, alphv, at&t, attack, authentication, breach, business, china, cio, ciso, citrix, cloud, credentials, crowdstrike, crypto, cyber, cybercrime, cybersecurity, data, data-breach, deep-fake, detection, email, espionage, exploit, extortion, finance, google, government, group, hacking, healthcare, incident response, infection, insurance, intelligence, international, jobs, lockbit, malicious, malware, mandiant, mfa, microsoft, network, nis-2, north-korea, office, phishing, phone, privacy, ransomware, regulation, risk, risk-management, scam, service, software, strategy, tactics, technology, threat, ukraine, update, vulnerability, windowsCybersecurity headlines were plenty this year, with several breaches, attacks, and mishaps drawing worldwide attention.But a few incidents in particular had far-reaching consequences, with the potential to reshape industry protections, shake up how vendors secure customers’ systems, or drive security leaders to reassess their strategies.Longer-term trends such as increased cybersecurity regulations and the impact of…
-
Companies Race to Use AI Security Against AI-Driven Threats
Palo Alto Networks’ Meerah Rajavel on Securing Enterprises With ‘Precision AI’. Security teams struggle to manage overwhelming data streams from detection systems while integrating multiple security tools. AI-powered solutions and unified architectures offer a path toward streamlined, effective threat response, said Meerah Rajavel, CIO, Palo Alto Networks. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/companies-race-to-use-ai-security-against-ai-driven-threats-a-27127
-
4 Wege zu neuer Cyberabwehrstärke
by
in SecurityNews
Tags: ai, antivirus, application-security, backdoor, cio, cloud, crypto, cyberattack, cybersecurity, data-breach, ddos, detection, hacker, iot, phishing, RedTeam, reverse-engineering, tool, vulnerabilityAnurag Goyal ist Head of Cybersecurity beim Plattformanbieter RedDoorz. Darüber hinaus hat er sich auch als Sicherheitsforscher und Ethical Hacker einen Namen gemacht. Anurag Goyal 3. Red Teaming Red Teaming stellt einen dynamischen und umfassenden Ansatz dar, um die Cyberresilienz von Organisationen zu bewerten und zu optimieren. Dabei simulieren Security-Profis ausgeklügelte Cyberattacken und ahmen dazu…
-
European authorities say AI can use personal data without consent for training
by
in SecurityNewsThe European Data Protection Board (EDPB) issued a wide-ranging report on Wednesday exploring the many complexities and intricacies of modern AI model development. It said that it was open to potentially allowing personal data, without owner’s consent, to train models, as long as the finished application does not reveal any of that private information.This reflects…
-
In potential reversal, European authorities say AI can indeed use personal data, without consent, for training
by
in SecurityNewsThe European Data Protection Board (EDPB) issued a wide-ranging report on Wednesday exploring the many complexities and intricacies of modern AI model development. It said that it was open to potentially allowing personal data, without owner’s consent, to train models, as long as the finished application does not reveal any of that private information.This reflects…
-
Zukunft schenken und die Hacker School unterstützen
Mitmachen und Zukunft schenken. In einer Zeit, in der IT-Technik und digitale Tools alle Facetten unseres Arbeitens und unseres Lebens beeinflussen, gehören digitale Skills einfach dazu. Es geht um Programmieren, Future Skills, KI-Kompetenz und IT-Berufsorientierung für die nächste Generation. Deshalb macht digitale Bildung den Unterschied. Seit über zehn Jahren engagiert sich die Hacker School für digitale…
-
AI and ‘Customer Zero’ Practices for Enhanced Usability
by
in SecurityNewsBarracuda’s Siroui Mushegian on Building Resilient Solutions Through Collaboration. Barracuda’s CIO Siroui Mushegian discusses how Barracuda uses AI and strong partnerships to deliver comprehensive cybersecurity solutions. The company builds products on AWS infrastructure, sells them through AWS Marketplace and uses AWS for internal systems. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/ai-customer-zero-practices-for-enhanced-usability-a-26977
-
Data Risk Intelligence: Sichtbarkeit von Datenrisiken und proaktive Risikominderung neu definieren
by
in SecurityNewsData Risk Intelligence kombiniert positions- und verhaltensbasierte Datenrisikoindikatoren, um Risiken für sensible Daten proaktiv zu erkennen und zu mindern. Erste Lösung, die die Datensicherheitsfunktionen der Imperva Data Security Fabric und der Thales CipherTrust Data Security Platform vereint, um CIOs, CISOs und Datenrisikospezialisten eine äußerst zuverlässige Risikobewertung von Daten zu bieten. Thales kündigt die… First seen…
-
Oracle’s Java price hikes push CIOs to brew new licensing strategies
by
in SecurityNewsUsers could save 50% with open source alternatives, says expert First seen on theregister.com Jump to article: www.theregister.com/2024/12/02/oracle_java_cio/
-
CIO POV: Building trust in cyberspace
by
in SecurityNews
Tags: access, ai, attack, best-practice, business, cio, cisa, cloud, cyber, data, deep-fake, encryption, framework, GDPR, group, identity, infrastructure, intelligence, Internet, mfa, mitre, nist, privacy, regulation, resilience, risk, service, software, strategy, technology, threat, tool, update, windowsTrust lies at the heart of every relationship, transaction, and encounter. Yet in cyberspace”, where we work, live, learn, and play”, trust can become elusive.Since the dawn of the internet nearly 50 years ago, we’ve witnessed incredible digital transformations paired with increasingly formidable threats. Knowing who and what to trust has become so difficult that…
-
Download the Cloud Optimization Enterprise Spotlight
by
in SecurityNewsDownload the December 2024 issue of the Enterprise Spotlight from the editors of CIO, Computerworld, CSO, InfoWorld, and Network World. First seen on us.resources.csoonline.com Jump to article: us.resources.csoonline.com/resources/download-the-cloud-optimization-enterprise-spotlight/
-
AWS launches tools to tackle evolving cloud security threats
by
in SecurityNewsThe increasing sophistication and scale of cyber threats pose a growing challenge for enterprises managing complex cloud environments. Security teams often face overwhelming volumes of alerts, fragmented workflows, and limited tools to identify and respond to attack patterns spanning multiple events.Amazon Web Services (AWS) is addressing these challenges with two significant updates to its cloud…
-
Der Weg zu einer sicheren Daten-Festung mit Data Governance
by
in SecurityNewsCISOs und CIOs sind in einer einzigartigen Position, um diese Zusammenarbeit voranzutreiben. Eine wirkungsvolle Option ist die Einrichtung eines Data … First seen on infopoint-security.de Jump to article: www.infopoint-security.de/der-weg-zu-einer-sicheren-daten-festung-mit-data-governance/a38651/
-
Security-FinOps collaboration can reap hidden cloud benefits: 11 tips
For enterprises operating on the cloud, security and cost management are rising concerns.Typically, these issues are addressed in silos, with cyber teams and FinOps teams pursuing their charters and priorities separately, and with little thought given to collaboration opportunities between these teams that could be leveraged for better business results.As CIOs seek to gain more…
-
The CSO guide to top security conferences
by
in SecurityNews
Tags: access, cio, cloud, compliance, conference, cyber, cybersecurity, email, germany, guide, identity, india, intelligence, international, jobs, law, resilience, risk, risk-management, threat, tool, training, updateThere is nothing like attending a face-to-face event for career networking and knowledge gathering, and we don’t have to tell you how helpful it can be to get a hands-on demo of a new tool or to have your questions answered by experts. Fortunately, plenty of great conferences are coming up in the months ahead.…
-
ANZ CIO Challenges: AI, Cybersecurity Data Analytics for 2025
by
in SecurityNewsANZ government CIOs face budget constraints while prioritizing AI, cybersecurity, and data analytics for productivity gains and digital transformation in 2025. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/anz-cio-challenges-ai-cybersecurity/
-
How to Become a Chief Information Officer: CIO Cheat Sheet
by
in SecurityNews
Tags: cioFirst seen on techrepublic.com Jump to article: www.techrepublic.com/article/how-to-become-a-cio-a-cheat-sheet/