Gartner: 3 Actions to Achieve Cybersecurity Consolidation

In this TechRepublic exclusive, Gartner VP Analyst Dionisio Zumerle shares three leadership strategies for achieving cybersecurity platform consolidation.

By |2024-06-21T20:25:04+00:00June 21, 2024|ciso, CXO, cybersecurity, cybersecurity leaders, gartner, leadership best practices, Security, security solutions, tech leaders, Uncategorized|Comments Off on Gartner: 3 Actions to Achieve Cybersecurity Consolidation

Proofpoint’s CISO 2024 Report: Top Challenges Include Human Error & Risk

This new report also indicates an increasing attack surface as putting pressure on CISOs. One positive note is CISOs' improving relationships with board members.

By |2024-05-30T21:00:25+00:00May 30, 2024|Artificial Intelligence, Australia, ciso, cloud security, CXO, cybersecurity, cybersecurity budget, data loss, International, proofpoint, ransomware, Security, Uncategorized, United Kingdom|Comments Off on Proofpoint’s CISO 2024 Report: Top Challenges Include Human Error & Risk

Australian CEOs Struggling to Face Cyber Risk Realities

Research has found 91% of CEOs view IT security as a technical function that's the CIO or CISO's problem, meaning IT leaders have more work to do to engage senior executives and boards.

By |2023-11-01T11:48:03+00:00November 1, 2023|Australia, boards, ceo, cio, ciso, CXO, cyber risk, cyber security, cybersecurity, cybersecurity engagement, data breach, executives, International, it leaders, risk management, Security, security risks, Uncategorized|Comments Off on Australian CEOs Struggling to Face Cyber Risk Realities

Check Point: Hackers Dropping Physical USB Drives at Watering Holes

Check Point's Global CISO discusses the firm's 2023 threat intelligence, including new AI malice and threat actors spreading malware by dropping flash drives.

By |2023-09-12T16:49:51+00:00September 12, 2023|Artificial Intelligence, check point software, ciso, cybersecurity, devops, hackers, Hardware, International, malware, Microsoft, penetration tests, Security, spam, spearphishing, Uncategorized|Comments Off on Check Point: Hackers Dropping Physical USB Drives at Watering Holes

Cisco: Booming identity market driven by leadership awareness

A new study by Cisco Investments with venture capital firms finds that most CISOs find complexity of tools, number of solutions and users, and even jargon a barrier to zero trust.

Gartner: Due to stress, half of cyber leaders will change jobs, and a quarter will quit the field

Among the strategic propositions in Gartner's 2023-2024 cybersecurity outlook are that organizations need to institute cultural changes to lower pressure on security teams.

By |2023-07-13T19:19:58+00:00July 13, 2023|ciso, Cloud, cybersecurity, gartner, gartner analysis, Security, Uncategorized|Comments Off on Gartner: Due to stress, half of cyber leaders will change jobs, and a quarter will quit the field

Gigamon’s Cloud Security Report Shares Insights on Undetected Breaches & Deep Observability

Global survey shows why you fear what you can't see: Confidence in security posture soars but so do worries about unseen vulnerabilities. The post Gigamon’s Cloud Security Report Shares Insights on Undetected Breaches & Deep Observability ap...

By |2023-06-30T17:47:25+00:00June 30, 2023|Australia, AWS, azure, ciso, CXO, hybrid cloud, International, Security, Uncategorized, United Kingdom|Comments Off on Gigamon’s Cloud Security Report Shares Insights on Undetected Breaches & Deep Observability

DDoS threats and defense: How certain assumptions can lead to an attack

The assumptions a business shouldn’t make about its DDoS defenses and the steps it should take now to reduce its likelihood of attack. The post DDoS threats and defense: How certain assumptions can lead to an attack appeared first on TechRepublic.

By |2023-06-13T14:18:37+00:00June 13, 2023|ciso, Cloud, ddos, ddos attacks, ddos protection, Security, Uncategorized|Comments Off on DDoS threats and defense: How certain assumptions can lead to an attack
Go to Top