Art Coviello, a partner at Rally Ventures and former CEO of RSA, recently met with a group of CISOs on the topic of presenting to the board. He was surprised - and not in a good way - at what he heard. Here are his tips for talking cybersecurity with senior business leaders.
In a crowded cybersecurity marketplace, it's challenging for newcomers not only to get funding, but also to rise above the noise and get attention. This is where venture capital firms can help, says Don Dixon, co-founder and managing director of ForgePoint Capital.
CISO stress levels are higher this year than last. What is the impact on these individuals and their enterprises? And what should be done to alleviate this stress? Stuart Reed of Nominet analyzes the latest CISO Stress report.
In an RSA 2020 conference keynote, Cisco's Wendy Nather spoke of "democratizing security" - thinking differently about the people we serve and secure. She expands on that theme and discusses her role as head of advisory CISOs at Cisco's Duo Security unit.
What are enterprises seeking in their next CISO - a technologist, a business leader or both? Joyce Brocaglia of Alta Associates shares insights on the key qualities she's looking for when recruiting CISOs.
Ex-federal CISO Gregory Touhill, a retired general, understands the global staffing crunch. Now, as president of AppGate Federal and as a board member for ISACA, he shares new insights on how to tackle cybersecurity recruiting and retention.
Global enterprises have spent a decade fighting the cybersecurity skills shortage, and Exabeam CEO Nir Polak has ideas about how automated tools can help fill the gap.
Are you attending the RSA 2020 conference? To help navigate the show, here's a preview of 12 top keynote sessions featuring some of the biggest names in cybersecurity tackling critical subjects, including cryptography, critical infrastructure security, bug bounties and supply chain risks.
Information Security Media Group, a premier media partner at the annual RSA Conference, will conduct over 200 video interviews at this year's event with cybersecurity thought leaders, executives, CISOs and sponsors.
Who's surprised Chinese military hackers allegedly hacked Equifax? For a foreign power that continues to attempt to amass personal information on its adversaries, targeting a business that gets rich by buying and selling Americans' personal data remains an obvious play.
British leaders' failure to more quickly choose and pursue a specific path for the nation's 5G rollout meant that ultimately, the decision got made for them, despite many security concerns persisting over the use of Chinese-built telecommunications gear.
Deception technologies offer a way to shift away from a purely defensive "detect and response" posture toward a more proactive offensive approach that draws stealth cyberattackers into the open before a breach.
It's a seductive story line: A chat app belonging to Saudi Arabia's crown prince is used to deliver malware to an American billionaire's phone. But a forensic investigation of Amazon CEO Jeff Bezos' phone raises more questions than it answers.
While secure coding has always been an imperative, in a cloud-based environment, BMC Software's Rick Bosworth says it is especially critical since the liability does not rest with cloud services providers for secure configuration.
Not even George Orwell could have predicted nation-state surveillance in the 21st century. Give us free instant messaging for our smartphones, and faster than you can say "viral kitten video," we're collectively part of a mass surveillance nightmare. Case in point: The ToTok social messaging app.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.