CISOs: unsupported, unheard, and invisible
A study conducted among CISOs worldwide from various industries sheds light on their strategies amid a challenging threat environment, identifies obstacles from business functions, and highlights their requirements for achieving success. “Our resea.....»»
How the best CISOs leverage people and technology to become superstars
What separates superstar CISOs from the rest of the pack is that they are keenly aware of the burgeoning threat landscape and the cybersecurity skills shortage, but they don’t give in to despair. Instead, they use their existing assets to great eff.....»»
CISOs consider zero trust a hot security ticket
The majority of organizations are on the road to implementing a zero trust framework to increase their overall security risk posture, according to PlainID. However, only 50% said that authorization makes up their zero trust program – potentiall.....»»
CISOs gear up to combat the rising threat of B2B fraud
The ongoing banking and economic turmoil has opened the floodgates to fraudsters. In this Help Net Security video, ex-British Intelligence officer Alex Beavan, Head of Ethics and Anti-Corruption at Convera, discusses how fraudsters target businesses.....»»
SeeMetrics Security Performance Boards empowers CISOs to validate security programs
SeeMetrics launched its new Security Performance Boards. Organized by security domains, the new Security Performance Boards are a collection of out-of-the box metrics that empower security leaders to measure the performance of their technologies, pro.....»»
These nearly invisible organisms help clean Lake Tahoe"s water. Here"s how they do it
Plankton are not just a diabolical mastermind on a Nickelodeon show about a sponge who lives under the sea. Lake Tahoe is filled with them—the good kind......»»
Designing for safety: 10 cybersecurity priorities for a zero-trust data center
Data center cybersecurity is a business decision. Here are 10 priorities for CIOs and CISOs to create an SASE strategy based on zero trust. Data center cybersecurity is a business decision. Here are 10 priorities for CIOs and CISOs to create an S.....»»
Unproven numbers distract from the real harm of the illicit antiquities trade, says study
New research has confirmed that the commonly repeated statement that the illicit antiquities trade is the third largest illicit trade in the world is unsupported by evidence......»»
CISOs are making cybersecurity a business problem
U.S. enterprises are responding to growing cybersecurity threats by working to make the best use of tools and services to ensure business resilience, according to ISG. Enterprises face growing cybersecurity threats The report for the U.S. finds that.....»»
Diligent Board Reporting for IT Risk equips CISOs with third party risk scores
Diligent launched Board Reporting for IT Risk to provide CISOs and IT risk professionals with a holistic view of their organization’s risk posture. “As cyber evolves so does the risk landscape, and it becomes a matter of not whether you.....»»
Researchers use isotopic analysis to map territories of jaguars in Belize
How do you study a predator with both camouflage and stealth that make it virtually invisible in the forest?.....»»
Exploring the ingenious science and science fiction of making things invisible
Greg Gbur chats about his book Invisibility: The History and Science of How Not to be Seen. Enlarge / H.G. Wells' The Invisible Man inspired a 1933 film. It's just one cultural example of the human fascination with invisibility......»»
Researchers invent trap for capturing and comparing individual bacterial cells
All hospitals battle an invisible threat: Pseudomonas aeruginosa. It is a type of bacteria that affects thousands of patients each year in intensive care units, where it can cause sepsis, pneumonia and other types of infections......»»
CISO perspective on why boards don’t fully grasp cyber attack risks
Due to their distinct perspectives, board members and CISOs often have differing views on cyber attack risks. The discrepancy arises when boards need cybersecurity expertise, need help comprehending technical jargon, or when CISOs need to communicate.....»»
The invisible plant technology of the prehistoric Philippines
Stone tools bear microscopic evidence of ancient plant technology, according to a study published June 30, 2023 in the open-access journal PLOS ONE by Hermine Xhauflair of the University of the Philippines Diliman and colleagues......»»
Report highlights children as the "hidden victims" of modern slavery
Dependent children of people impacted by human trafficking and modern slavery are being left unsupported and their needs overlooked, putting families at risk of intergenerational trauma......»»
How cyber insurance empowers CISOs
In this Help Net Security video, Fawaz Rasheed, Field CISO at VMware, discusses how cyber insurance remains the high tide that rises ships. For organizations choosing to purchase cyber insurance, the requirements set forth towards them are beneficial.....»»
How to Check the Air Quality Near You
Here’s what to know about wildfire smoke and invisible pollutants, and how you can use your phone to decide whether it’s safe to spend time outside......»»
CYE Hyver enhancements empower organizations with real-time risk analysis module
CYE announced a new capability in its Hyver platform that calculates dynamic risk in real-time. Hyver sets a new standard for the industry that will allow CISOs to take mitigation plans to the next level by optimizing real-time data to make both shor.....»»
Cybersecurity culture improves despite the dark clouds of the past year
Despite a hardening economic climate, heightened global tensions and the onset of new technology making cybercrime easier, 76% of the CISOs, suggested that no material breaches had occurred and 60% said that no material cybersecurity incident had occ.....»»
Red teaming can be the ground truth for CISOs and execs
This year, against the backdrop of attacks on everyone from healthcare institutions and schools to financial services organizations, as well as the introduction of legislation across the UK and EU to move security up the agenda, cybersecurity has und.....»»