Five years post-pandemic, half of CISOs at enterprises with revenue of $20 billion or more now hold EVP- or SVP-level titles. The post Million-dollar Salaries, Board Influence Mark the CISO’s Rise appeared first on Security Boulevard. This article has been…
Category: Security Boulevard
BSidesLV24 – PasswordsCon – Cloud Attack: Dissecting Attack Paths With Graph-Mode
Author/Presenter: Filipi Pires Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and via the organizations YouTube channel. Permalink The post BSidesLV24…
Zscaler Moves to Acquire Red Canary MDR Service
Zscaler this week revealed it is acquiring Red Canary, a provider of a managed detection and response (MDR) service that will be incorporated into the portfolio of offerings delivered via a zero-trust cloud platform for accessing applications. The post Zscaler…
Strategies for Enhancing Your Organization’s Cyber Resilience
Organizations must improve their cyber resilience – not just for the sake of business operations, but to maintain customer confidence. The post Strategies for Enhancing Your Organization’s Cyber Resilience appeared first on Security Boulevard. This article has been indexed…
Feel Supported by Your NHI Security Team
Have You Considered the Strategic Importance of NHI Management? Consider this: The evolving technology has caused a seismic shift in how businesses protect their IT infrastructure. A crucial part of this protection is the effective management of Non-Human Identities (NHIs)…
Unlocking Powerful Benefits with NHIs
Is Your Organization Realizing the Powerful Benefits of NHIs? Acquiring a deep understanding of Non-Human Identities (NHIs) is pivotal for organizations striving to build solid fortifications around their data and systems. NHIs, also known as machine identities, are the unseen…
Building Trust Through Effective NHI Management
Why is Trust Crucial in NHI Management? Think about it. How much faith do we place in Non-Human Identities (NHIs) that aid in modern cybersecurity protocols? Is that trust well-founded? The role of trust in NHI management becomes key as…
CISO’s open letter on third-party software risk is a call to action
The accelerated adoption of software as a service (SaaS) has fundamentally changed software consumption patterns, but it has also introduced a significant concentration of risk across enterprise environments and global critical infrastructure. The post CISO’s open letter on third-party software…
Victoria’s Secret Hit By ‘Security Incident’ After Attacks on UK Retailers
Victoria’s Secret took down its U.S. website this week after an unspecified security incident that cybersecurity experts believe is related to similar attacks on UK retailers earlier this month by the high-profile threat group Scattered Spider, which appears to be…
Survey Surfaces Scope of Identity and Access Management Challenges
A survey of 625 IT and IT security professionals in the U.S. published today finds only half (50%) consider the investments made in identity and access management (IAM) tools to be effective. Conducted by the Ponemon Institute on behalf of…