Gartner: 3 Actions to Achieve Cybersecurity Consolidation

Gartner: 3 Actions to Achieve Cybersecurity Consolidation

Cybersecurity leaders are grappling with the complexity, overlap and blind spots that come from using multiple cybersecurity vendors and tools. Many of the products offered by cybersecurity vendors have overlapping capabilities, making it easy for misconfigurations to occur and difficult to uncover security gaps. Consolidating cybersecurity products reduces this complexity by streamlining the number of products and their interactions, thus improving efficiency of security outcomes. Organizations consolidate security solutions for a variety of reasons, such…

Read More

The CISO role will either flourish or vanish

The CISO role will either flourish or vanish

Without a doubt, any C-level executive title comes at a personal cost — sleepless nights, countless questions and loads of responsibilities. That said, I believe today’s role of the CISO is accompanied by enormous pressures. Consequently, the way the role is currently structured does not set the CISO, nor the organization, up for success.  In speaking with my peers across the industry, I realize that we’re at a pivotal time for CISOs. Since its creation…

Read More

A CISO's perspective on the modern cybersecurity landscape

A CISO's perspective on the modern cybersecurity landscape

Many businesses still believe there is such a thing as 100% security, despite every cybersecurity expert affirming the opposite. Because companies push for and demand 100% security, the organization ultimately settles for a false sense of it so their people can function. Such a mindset is not only wrong but incredibly dangerous. Business leaders must recognize that breaches are imminent, and a robust approach to cybersecurity involves detecting and responding quickly and effectively to incidents….

Read More

Proofpoint's CISO 2024 Report: Top Challenges Include Human Error & Risk

Proofpoint's CISO 2024 Report: Top Challenges Include Human Error & Risk

In Proofpoint’s 2024 Voice of the CISO report, the cybersecurity company found that CISOs are dealing with people-centric threats more than ever. Plus, cybersecurity budgets often don’t change, and AI can help and hurt CISOs’ efforts. Regarding the specific threat risks, 41% of the CISOs mostly fear ransomware attacks, followed by malware (38%), email fraud (36%), cloud account compromise (34%), insider threat (30%) and distributed denial of service (30%) attacks. Biggest threat risks as perceived…

Read More

70% of CISOs feel vulnerable to a material cyberattack in 2024

70% of CISOs feel vulnerable to a material cyberattack in 2024

Proofpoint released a report that surveyed 1,600 CISOs worldwide in order to shed light on their experiences, insights and predictions. The report found that 70% of CISOs feel vulnerable to a material cyberattack; however, only 43% feel unprepared to manage a cyberattack.  A notable finding from the report is that a majority of CISOs are concerned about human error. 74% of CISOs view their own people as their organization’s largest vulnerability, and 87% are planning…

Read More

Top 5 things CISOs should know to protect their business

Top 5 things CISOs should know to protect their business

For businesses of every size and level of maturity, a strong cybersecurity strategy is crucial to protecting sensitive data and other digital assets. The right security measures are key to building resilience against increasingly sophisticated cyber threats in an interconnected world but must also be optimized for a company’s business. There is no one best practice that is applicable to every company. The focus on cybersecurity will continue to sharpen, and companies will rely more…

Read More

CISOs aren’t scapegoats: Fostering a security-first culture

CISOs aren’t scapegoats: Fostering a security-first culture

Ten years ago, it was the norm for security breaches to be the sole responsibility of the chief information security officer (CISO). For this reason, the CISO role traditionally had a higher turnover rate, with many experiencing extreme burnout. But now, as data breaches make regular headlines and every organization becomes a lucrative target for cybercriminals, IT security has become a business priority, causing the full C-suite to take note.  Cybersecurity is now a business…

Read More

Pentesting accounts for an average of 13% of total IT security budgets

Pentesting accounts for an average of 13% of total IT security budgets

A report by Pentera has revealed that enterprises continue to emphasize pentesting as a tool for security validation strategies. Among surveyed respondents, pentesting takes up an average of 13% of the security team’s budget, or an average of $164,400. The report surveyed 450 CIOs, CISOs and IT security leaders to gather this data, shedding light on how enterprises are approaching security validation.  As breach efforts from malicious actors continue to evolve, the subsequent losses from…

Read More

4 practices CISOs should prioritize in their mobile security strategy

4 practices CISOs should prioritize in their mobile security strategy

In an era where cyber threats are evolving at an alarming pace, the role of a Chief Information Security Officer (CISO) has never been more critical. Today, CISOs are the guardians of an organization’s digital assets, and in this role, they face a very daunting task — they’re being called to protect sensitive data, maintain customer trust and ensure business continuity without introducing friction. In the case of banks and financial institutions, this trove of…

Read More

Lester Godsey | Top Cybersecurity Leaders 2024

Lester Godsey | Top Cybersecurity Leaders 2024

Over the past three decades, Lester Godsey has dedicated himself to serving his communities through his roles in public sector cybersecurity. Godsey took his first cybersecurity job as a Support Center Analyst in the College of Engineering and Applied Sciences at his alma mater, Arizona State University (ASU), while he was an undergraduate studying music. While he initially considered becoming a band teacher, he soon discovered his interest in system administration and cybersecurity, which eventually…

Read More
1 2 3 4