What are the top five security activities that lead to the best outcomes, and why do they work so well? Those critical issues were closely examined in a recent study commissioned by Duo Security/Cisco, says Helen Patton, advisory CISO, who discusses the findings.
One of the most important recent developments by CISA has been the creation of the Joint Cyber Defense Collaborative, which is focused on operational private-public collaboration, says Kiersten Todt, CISA chief of staff.
Software bills of material, or SBOMs, are still "years away" from being ubiquitous, says Grant Schneider, senior director for cybersecurity services at Venable. He says it will take time for them to catch on, and a set of standards and other critical components for industry need to be defined.
The role was vastly different 10 years ago, and it will morph yet again 10 years from now. This makes the CISO's job the most challenging in the cybersecurity sector, says John Horn, cybersecurity practice director at Aite-Novarica Group. He shares highlights of recent research.
In an organization, people are the ones who develop and sustain organizational strategy. Talented people are discovering that it's possible to leave a toxic environment so they can breathe and thrive. Marco Túlio Moraes explores how to retain both talent and strategy.
Recently CybelAngel CEO, Erwan Keraudy, and CRO Jeff Gore, sat down with Mathew Schwartz, Executive Editor of DataBreach Today to discuss ways for businesses to protect their growing external attack surface.
To advance a more inclusive and diverse workforce in cybersecurity, it is imperative to consider "every person in the room," says Michael Cunningham, vice president and CISO of Graphic Packaging International LLC. He discusses ways for organizations to become more inclusive and diverse.
The Cyber Threat Alliance just celebrated its fifth birthday, and President and CEO J. Michael Daniel says the membership and information sharing both are growing at an impressive pace. He discusses the surge in ransomware and how organizations should respond.
Michael Lines is working with ISMG to promote awareness of the need for cyber risk management, and the CyberEdBoard is posting draft chapters from his upcoming book, "Heuristic Risk Management: Be Aware, Get Prepared, Defend Yourself." This chapter - the last in the series - is titled "Building an Effective Defense."
According to Accenture Security's new report titled "Elevating the Cybersecurity Discussion," only 38% of CEOs and CFOs are confident that over 75% of their organization is actively protected by their cybersecurity program. Ryan LaSalle discusses how to help the C suite understand cybersecurity.
Alberto Hasson, the CISO at ICL Group, discusses how to avoid becoming the next victim of a ransomware or other malware attack. He outlines what defenders can do to close gaps in their defense strategies and how they can mitigate attackers' ever-evolving tactics.
In this episode of "Cybersecurity Unplugged," Tim Danks of Global Risk Perspectives discusses issues around trusting our global supply chain, including the role of Huawei, the steps needed to secure critical infrastructure, and the process for determining a comfortable level of risk management.
Never have global financial institutions
faced such adversaries. The cybercriminal gangs now wield tools that
used to be the province of nation-states, and the nation-states now
engage in activities that once were owned by cybercrime. Scams
and schemes including account
takeover, denial of service and ransomware...
Dennis Leber, CISO and CTO at the University of Tennessee Health Science Center, says cybersecurity is not just a profession - it's a lifestyle. And as he leads this life, he finds one of today's biggest cybersecurity threats is not ransomware or IP theft - it's "the buzzword mentality."
In the latest "Troublemaker CISO" post, security director Ian Keller discusses the issue of supply chain security and whether you should disclose information about your supply chain to companies as part of the effort to secure it. His conclusion: Build your defenses and trust no one.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ransomware.databreachtoday.com, you agree to our use of cookies.