Tag "CISO"

Back to homepage
Hardware/Network

Building an Integrated IT/OT Security Program: Notes From the Field

Let’s start this column with some good news. I speak with dozens of enterprises every month about security (or lack thereof) in their operational technology (OT) environment, and I’m seeing

Software

Maliciuos hacking activity increasingly targeting critical infrastructure

In this podcast, Andrew Ginter, VP of Industrial Security at Waterfall Security Solutions, and Edward Amoroso, CEO of TAG Cyber, talk about how the traditional focus of most hackers has been on

Hardware/Network

Key weapon for closing IoT-era cybersecurity gaps? Artificial intelligence

As businesses struggle to combat increasingly sophisticated cybersecurity attacks, the severity of which is exacerbated by both the vanishing IT perimeters in today’s mobile and IoT era, and an acute shortage of skilled

Software

Data privacy automation: Unlock your most valuable asset

In years past, data privacy was the purview of the chief privacy officer. However, increasingly, CTOs are being tasked with operationalizing a data privacy solution for the company. That’s because data privacy

Industry Insights

Why Are We Still Talking About the Reporting Line of the CISO?

Why are so many organisations and security professionals still worried about the reporting line of the CISO? This is one of the oldest and most consistent debate agitating the security industry, and

Industry Insights

Hackers wage a new Cold War

The Cold War of the mid-twentieth century played out as a truly epic conflict. The U.S. and the Soviet Union mobilized spies across the globe, supported proxy armies from the

Software

“Zero Trust” Is the Opposite of Business

The term zero trust has been cropping up a lot recently, with even a small conference on the topic recently. It sounds like an ideal security goal, but some caution is warranted.

Hardware/Network Mobile

Personal mobile devices are the biggest threat to your network

Remote working and BYOD may be popular among employees but both pose a high risk to IT and security teams.Personal device use for remote work poses the biggest security risk

Identity Theft Software

Phished credentials caused twice as many breaches than malware in the past year

Personal device use for remote work poses the biggest security risk to organisations safeguarding their increasingly mobile and cloud-based IT environment, according to a new survey of 100 UK-based senior

Software

How Automation Helps Security Managers

It’s the nature of security operations: the worse the situation, the more you need everything to be working perfectly. Any issues with your program need to be figured out ahead