Cloud security today: Complexity, compliance, and containerization
An new report by Threat Stack and ESG sheds light on the security and business challenges that accompany the growth of public cloud environments and containers. Overall, the …
Sophisticated threats? It’s usually the basic ones that get you
To listen to the headlines, the threats we face today are so sophisticated and intense, they can only be evaded with the help of artificial intelligence and machine learning. …
The evolving nature of the CISO role
As IT security increasingly becomes a priority, CISOs’ influence within companies is growing. However, security strategy in many organizations is still largely reactive and …
KPN CISO paints a greater security picture
Being the CISO of such a huge and diverse company as KPN, the Netherlands’ largest telecom and ISP provider, requires great determination, and the current holder of the …
Qualys CISO on making everything visibile and secure
In this podcast recorded at Black Hat USA 2017, Mark Butler, CISO at Qualys, talks about his role, streamlining security and compliance solutions, building security into …
Rising information security threats, and what to do about them
The digital threat landscape faced by enterprises large and small is in perpetual flux, and keeping an eye on things and adapting defenses should be of primary importance to …
Highest European CISO salaries set to reach €1 million
Chief Information Security Officers supervise information systems for their organization, and are in charge of coming up with, proposing, and implementing workable solution …
What healthcare CISOs should know
“Are we more secure today than yesterday?” is the question every healthcare organization needs to asks itself every day. in order to develop a more effective security posture, …
Protecting data isn’t optional: What frustrates CIOs and CISOs?
In this podcast recorded at RSA Conference 2017, Chris Drake, CEO at Armor, talks about the frustration that he sees in the cybersecurity industry as he continues to meet CIOs …
Which countermeasures improve security and which are a waste of money?
If you want to know about which cyber defenses are most effective and which are a waste of money and resources, ask a hacker. And that’s just what Nuix researchers did. …
Companies struggle to deploy security for custom applications
As more and more companies migrate their application workloads from their datacenters to infrastructure-as-a-service (IaaS) platforms such as the Amazon Web Services (AWS) …
The new CISO imperative: Solving the information management paradox
In the drive to become more cyber resilient in 2017, organizations are extending risk management that is traditionally based on parametric measures (i.e., data loss prevention …