CSO and CISO | News, how-tos, features, reviews, and videos

3 security vendors

Most enterprises looking to consolidate security vendors

Three-quarters of all enterprises expect to reduce the number of security vendors they use according to a recent survey, more than double the number from 2020.

An abstract network of currency symbols overlays a team of three in discussion.

How 2023 cybersecurity budget allocations are shaping up

Security spending is not expected to slow much next year as organizations look to improve cloud defenses, rely more on MSSPs.

Department of Justice FBI building

U.S. Federal Court breach reveals IT and security maturation issues

An investigation into the 2020 breach results in 18 recommendations for the Administrative Office of the U.S. Courts to change its IT and security policies and practices.

Conceptual images of an executive as she walks the path forward into the light.

7 best reasons to be a CISO

The role of the CISO has its challenges, but these positives are what people in the role say make it all worthwhile.

Mobile phone data privacy.

Data privacy: Collect what you need, protect what you collect

Data over-collection is a security and compliance risk, and that's why CISOs need a say in decisions about what data to collect.

CSO > wolf in sheeps clothing / fraud / identity theft / social engineering

How a sex worker became a defense contractor employee -- and an insider threat

An accomplished research scientist manipulated a defense contractor CEO into hiring a prostitute for a technical role. Here's how this insider threat could have been avoided.

An abstract network of currency symbols surrounds a tiny globe that sits on the based of a laptop.

5 key considerations for your 2023 cybersecurity budget planning

An evolving threat landscape, regulatory requirement changes, and increases in cyber insurance are among leading factors that will impact next year's security budget.

United States Capitol Building / Congress / legislation in a digital landscape

U.S. NDAA heads into the home stretch with significant cybersecurity amendments pending

The main defense spending bill might enact the most significant pieces of U.S. cybersecurity legislation this year.

CSO  >  danger / security threat / malware / grenade-shaped flash drive

How you handle independent contractors may determine your insider threat risk

Outside experts can be willing or accidental security threats. Reduce that risk by changing how you onboard, train and offboard them.

superhero executives strong leaders mask rescue cape colorful costume

We don’t need another infosec hero

By setting yourself up as the defender, the solver of problems, you cast your business colleagues as hapless victims or, worse, threats. This is not a useful construct for engagement.

Aspects of employment / communication / networking / partnership / collaboration / teams / hiring

6 top attributes employers want in new CISOs

As the chief information security officer role rises in importance, so do the expectations of hiring organizations. These are the key qualities and skills recruiters are asked to look for.

Intelligent workspaces - Redefining the future of work

Latest Cyberspace Solarium Commission 2.0 Report focuses on cyber workforce

The June 2022 report offers recommendations to the private sector, U.S. Congress, and the federal government to build up the nation's cybersecurity talent pool.

storm disaster recovery disruption rain umbrella tornado challenge weather

4 reasons why CISOs can’t ignore climate change

Climate change is causing disruptions to the supply chain and critical services, and attackers are keen to take advantage of it.

gavel / abstract binary lines  >  court judgment / fine / penalty / settlement

HiQ v LinkedIn court ruling will have a material effect on privacy

A U.S. appeals court has ruled that hiQ's scraping of public LinkedIn data is not a violation of the U.S. Computer Fraud and Abuse Act.

Team member extends all hands in for a huddle. [unity / teamwork / trust / diversity / inclusion]

What does it mean for cybersecurity to “align with the business"?

Showing how security helps business achieve its objectives is a two-step process: Speak the language of business and do cost-benefit analyses that prove value returned.

binary highway

Uber CISO's trial underscores the importance of truth, transparency, and trust

The criminal trial offers a lesson in the value of both CISOs and organizations adhering to a policy of truth, transparency and trust when it comes to security.

binary cyberattack cybersecurity hacked protected

CISOs worried about material attacks, boardroom backing

CISOs are also less concerned about ransomware attacks, but many says their organizations are still not properly prepared for them.

executives on the move stairs career promotion upward steps

Security leaders chart new post-CISO career paths

The evolution and growing prominence of the CISO role gives holders more options on where to go next in their careers.

handshake / meeting / teamwork / collaboration / partnership / trust

Secrets to building a healthy CISO-vendor partnership

Productive CISO-vendor partnerships are to key to overall security success. Here's how to establish and maintain effective relationships with security vendors.

board of directors

Cybersecurity metrics corporate boards want to see

These are the metrics that boards of directors will find useful because they help map security investments with strategic goals and risks.

Load More
You Might Also Like
Learn more