Lianne Potter | Women in Security 2023

Lianne Potter | Women in Security 2023

Lianne Potter | Women in Security 2023 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Security Chiefs Take On IT Roles as More Infrastructure Moves Online

Security Chiefs Take On IT Roles as More Infrastructure Moves Online

Stay-at-home orders during the Covid-19 pandemic spurred new cloud computing and remote-technology setups, increasing company exposure to hackers. As a result, some corporate cybersecurity chiefs are also taking on the leadership role for all of information technology. Oversight of both groups isn’t an easy line to walk.  Having spent years in general IT, these chief information security officers understand the cyber risks of an increasingly far-flung tech infrastructure, said Lucia Milică Stacy, global resident CISO…

Read More

Cybersecurity Chiefs Navigate AI Risks and Potential Rewards

Cybersecurity Chiefs Navigate AI Risks and Potential Rewards

Security chiefs say the benefits of artificial intelligence are clear, but that the promises and risks of early generative AI are overblown. Generative AI platforms such as OpenAI’s ChatGPT have gained attention for their ability to answer conversational questions, write essays and perform other tasks in humanlike ways. Security vendors are touting the benefits of the technology, saying it can augment human analysts by analyzing and distilling data from wildly different sources into a digestible…

Read More

Improving IT security through cross-department collaboration

Improving IT security through cross-department collaboration

Improving IT security through cross-department collaboration | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

Cybersecurity Leaders Suffer Burnout as Pressures of the Job Intensify

Cybersecurity Leaders Suffer Burnout as Pressures of the Job Intensify

Relentless cyberattacks and pressure to fix security gaps despite budget constraints are raising the stress levels of corporate cyber leaders and their worries about personal liability, a growing concern since the criminal case against Uber Technologies ’ former security chief. Hacks on companies’ IT systems often come with business disruptions, reputational damage, regulatory investigations and lawsuits. Chief information security officers must manage cybersecurity risks and, at the same time, educate C-suite colleagues and the board….

Read More

Secure code training ruled better investment than code scanning tools

Secure code training ruled better investment than code scanning tools

Secure code training ruled better investment than code scanning tools | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

How to secure organizational SaaS and increase third-party visibility

How to secure organizational SaaS and increase third-party visibility

How to secure organizational SaaS and increase third-party visibility | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

6 areas to watch in the Software Bill of Materials evolution

6 areas to watch in the Software Bill of Materials evolution

6 areas to watch in the Software Bill of Materials evolution | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

Email cyberattacks increased 48% in first half of 2022

Email cyberattacks increased 48% in first half of 2022

Email cyberattacks increased 48% in first half of 2022 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More
1 2 3