A CISO's perspective on the modern cybersecurity landscape

A CISO's perspective on the modern cybersecurity landscape

Many businesses still believe there is such a thing as 100% security, despite every cybersecurity expert affirming the opposite. Because companies push for and demand 100% security, the organization ultimately settles for a false sense of it so their people can function. Such a mindset is not only wrong but incredibly dangerous. Business leaders must recognize that breaches are imminent, and a robust approach to cybersecurity involves detecting and responding quickly and effectively to incidents….

Read More

Proofpoint's CISO 2024 Report: Top Challenges Include Human Error & Risk

Proofpoint's CISO 2024 Report: Top Challenges Include Human Error & Risk

In Proofpoint’s 2024 Voice of the CISO report, the cybersecurity company found that CISOs are dealing with people-centric threats more than ever. Plus, cybersecurity budgets often don’t change, and AI can help and hurt CISOs’ efforts. Regarding the specific threat risks, 41% of the CISOs mostly fear ransomware attacks, followed by malware (38%), email fraud (36%), cloud account compromise (34%), insider threat (30%) and distributed denial of service (30%) attacks. Biggest threat risks as perceived…

Read More

70% of CISOs feel vulnerable to a material cyberattack in 2024

70% of CISOs feel vulnerable to a material cyberattack in 2024

Proofpoint released a report that surveyed 1,600 CISOs worldwide in order to shed light on their experiences, insights and predictions. The report found that 70% of CISOs feel vulnerable to a material cyberattack; however, only 43% feel unprepared to manage a cyberattack.  A notable finding from the report is that a majority of CISOs are concerned about human error. 74% of CISOs view their own people as their organization’s largest vulnerability, and 87% are planning…

Read More

Top 5 things CISOs should know to protect their business

Top 5 things CISOs should know to protect their business

For businesses of every size and level of maturity, a strong cybersecurity strategy is crucial to protecting sensitive data and other digital assets. The right security measures are key to building resilience against increasingly sophisticated cyber threats in an interconnected world but must also be optimized for a company’s business. There is no one best practice that is applicable to every company. The focus on cybersecurity will continue to sharpen, and companies will rely more…

Read More

CISOs aren’t scapegoats: Fostering a security-first culture

CISOs aren’t scapegoats: Fostering a security-first culture

Ten years ago, it was the norm for security breaches to be the sole responsibility of the chief information security officer (CISO). For this reason, the CISO role traditionally had a higher turnover rate, with many experiencing extreme burnout. But now, as data breaches make regular headlines and every organization becomes a lucrative target for cybercriminals, IT security has become a business priority, causing the full C-suite to take note.  Cybersecurity is now a business…

Read More

Pentesting accounts for an average of 13% of total IT security budgets

Pentesting accounts for an average of 13% of total IT security budgets

A report by Pentera has revealed that enterprises continue to emphasize pentesting as a tool for security validation strategies. Among surveyed respondents, pentesting takes up an average of 13% of the security team’s budget, or an average of $164,400. The report surveyed 450 CIOs, CISOs and IT security leaders to gather this data, shedding light on how enterprises are approaching security validation.  As breach efforts from malicious actors continue to evolve, the subsequent losses from…

Read More

4 practices CISOs should prioritize in their mobile security strategy

4 practices CISOs should prioritize in their mobile security strategy

In an era where cyber threats are evolving at an alarming pace, the role of a Chief Information Security Officer (CISO) has never been more critical. Today, CISOs are the guardians of an organization’s digital assets, and in this role, they face a very daunting task — they’re being called to protect sensitive data, maintain customer trust and ensure business continuity without introducing friction. In the case of banks and financial institutions, this trove of…

Read More

Lester Godsey | Top Cybersecurity Leaders 2024

Lester Godsey | Top Cybersecurity Leaders 2024

Over the past three decades, Lester Godsey has dedicated himself to serving his communities through his roles in public sector cybersecurity. Godsey took his first cybersecurity job as a Support Center Analyst in the College of Engineering and Applied Sciences at his alma mater, Arizona State University (ASU), while he was an undergraduate studying music. While he initially considered becoming a band teacher, he soon discovered his interest in system administration and cybersecurity, which eventually…

Read More

Ryan Field | Top Cybersecurity Leaders 2024

Ryan Field | Top Cybersecurity Leaders 2024

From protecting sensitive financial data to serving his country, Ryan Field has dedicated his career to cybersecurity, leading innovative programs to secure systems and develop the next generation of experts in the field. Ryan Field was hired into the security field straight out of college, working at PricewaterhouseCoopers (PwC) in IT Security assessments, including penetration testing. This inspired Field to pursue his master’s, wanting to learn more about cybersecurity. After attending Harvard, Field continued to…

Read More

2024 Healthcare Cybersecurity: Mastering The Fundamentals

2024 Healthcare Cybersecurity: Mastering The Fundamentals

2024 text written on a multi colored flowing binary code background. New Year 2024 celebration … [+] concept. getty In 2024, the healthcare industry faces a critical need to enhance cybersecurity. With an average cost of $1.3 million per cyberattack, healthcare organizations must move beyond chasing the latest trends and fortify their basic security posture. This year’s cybersecurity incident in one of the largest healthcare organizations underscores the shift of cybersecurity from a mere option…

Read More
1 2 3 4