The ever-expanding threat landscape and the continued talent shortage mean defenders increasingly need to be ready with the skilled talent to face the onslaught of cybercriminals who are gaining momentum by employing new tactics, according to Pamela Nigro, ISACA board chair.
The guilty verdict against Joe Sullivan, former chief security officer of Uber, has generated much discussion about CISO accountability for disclosures of breaches. How should CISOs be preparing to deal with this responsibility? Kirsten Davies, CISO at Unilever, said communication is crucial.
Much of the friction between CISOs and their general counsels, according to Ron Raether, partner at Troutman Pepper, is the result of ignorance. General counsels don't understand the full extent of IT and information security and often pin the blame on the CISOs, who become the scapegoats.
In this episode of "Cybersecurity Unplugged," Craig Box, vice president of open source and community at ARMO, discusses the complexity of using Kubernetes in a hybrid cloud environment, the need to understand "how these moving parts work together" and potential use of Kubernetes with 5G.
Sara Pan, senior product marketing manager at Proofpoint shares insights from Proofpoint's 2022 Security Awareness Study on how to improve security awareness training programs.
How effective are your cybersecurity awareness programs—and do your employees agree?
This central question was the cornerstone of this research project which assessed the efficacy of cybersecurity
awareness programs from both perspectives—the security professional
and the non-security employee.
The responses...
Governance issues for public sector CISOs tend to focus more on shifting culture rather than maximizing efficiency for shareholders, as is expected from private sector security leaders. City of Phoenix CISO Shannon Lawson shares why good communication is crucial when a city council is involved.
From SolarWinds to Kaseya, Accellion, Log4j and Okta, third-party security breaches are among the most devastating for organizations affected. Tony Morbin of ISMG dives into the story behind the results of a global survey with Demi Ben-Ari, the co-founder, CTO and head of security at Panorays.
This compendium brings together Gigamon's thought
leadership work in collaboration with Information Security
Media Group between during H1 2022. Gigamon's resources
include two fireside chat webinars, two panel interview
videocasts & eBooks, plus a field research survey, expert
analysis and report of results....
Beyond advising the seniormost levels of the business in the strategic use of technology, the need to recruit new cybersecurity professionals often also tops the list of tasks facing today's security leaders, says Rob Hornbuckle, CISO of Allegiant Air.
Many people enter the cybersecurity field with foundational skills, such as knowledge gleaned from college courses, and giving them "practical skills, to be ready go out on the job floor and be ready to do something - that takes a little bit of something extra," says ITProTV co-founder Don Pezet.
Cyber attackers have skills well beyond traditional information technology (IT) intrusions
and data exfiltration techniques—and they have set their sights on operating technology
(OT) environments. They have demonstrated an understanding of industrial control
systems (ICSs) and have an impressive ability to...
At a time when applications are more business-critical than ever - and visibility is more challenging to achieve - we need to discuss new strategies and tools for maximizing application intelligence. Sujay Pathakji of Axiom Telecom and Srudi Dineshan of Gigamon share insights.
Zero Trust Network Access (ZTNA) is one of the biggest concepts in cybersecurity, and for good reason – it’s one of the most secure and reliable ways to protect critical assets, like systems, networks, applications, and data, from bad actors or inappropriate user access.
Use this Zero Trust checklist as a...
Harold Moss, the CEO of Tautuk, has a background in building products, but many in cybersecurity do not come from a product background. In this interview with Brian Barnier, he discusses the importance of context, listening and collaboration for teams to understand creative and critical thinking.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing devicesecurity.io, you agree to our use of cookies.